950 resultados para Attachment security
Resumo:
Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.
Resumo:
The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.
Resumo:
Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.
Resumo:
We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.
Resumo:
In recent years, increasing focus has been made on making good business decisions utilizing the product of data analysis. With the advent of the Big Data phenomenon, this is even more apparent than ever before. But the question is how can organizations trust decisions made on the basis of results obtained from analysis of untrusted data? Assurances and trust that data and datasets that inform these decisions have not been tainted by outside agency. This study will propose enabling the authentication of datasets specifically by the extension of the RESTful architectural scheme to include authentication parameters while operating within a larger holistic security framework architecture or model compliant to legislation.
Resumo:
Aims: Caveolin-1 (cav1) is reported to have both cell survival and pro-apoptotic characteristics. This may be explained by its localisation or phosphorylation in injured cells. This study investigated the role of cav1 in kidney cells of different nephron origin and developmental state after oxidative stress. Methods: Renal MCDK distal tubular, HK2 proximal tubular epithelial cells and HEK293T renal embryonic cells were treated with 1mM hydrogen peroxide. Apoptosis, loss of cell adhesion, and cell survival were compared with expression of cav1 in its non-phosphorylated and phosphorylated (p-cav1) forms. Cav1 was transfected into the HEK293T cells, or caveolae were disrupted with filipin or nystatin in HK2 cells, to investigate functions of cav1 and p-cav1. Results: Oxidative stress induced more apoptosis in HK2s than MDCKs (p<0.05). HK2s had lower endogenous cav1 and p-cav1 than MDCKs (p<0.05). Both cell lines had increased p-cav1, but not cav1, with oxidative stress. This increase was greatest in MDCKs (p<0.01). Cav1 was located mainly in the plasma membrane of untreated cells and translocated to the cytoplasm with oxidative stress in both cell lines, more so in MDCKs. Disruption of caveolae caused cytoplasmic translocation of cav1 in HK2s, but did not alter high levels of oxidative stress-induced apoptosis. When HEK293Ts lacking endogenous cav1 were transfected with cav1, oxidant-induced apoptosis and loss of cell adhesion was decreased (p<0.01), and p-cav1 was induced by treatment. Conclusion: Cav1 expression and localisation in kidney cells is not anti-apoptotic, but increased expression of p-cav1 may promote cell survival after oxidative stress. © 2008 Royal College of Pathologists of Australasia.
Resumo:
Abstract Ag-TiO2 and Au-TiO2 hybrid electrodes were designed by covalent attachment of TiO2 nanoparticles to Ag or Au electrodes via an organic linker. The optical and electronic properties of these systems were investigated using the cytochrome b5 (Cyt b5) domain of sulfite oxidase, exclusively attached to the TiO2 surface, as a Raman marker and model redox enzyme. Very strong SERR signals of Cyt b 5 were obtained for Ag-supported systems due to plasmonic field enhancement of Ag. Time-resolved surface-enhanced resonance Raman spectroscopic measurements yielded a remarkably fast electron transfer kinetic (k = 60 s -1) of Cyt b5 to Ag. A much lower Raman intensity was observed for Au-supported systems with undefined and slow redox behavior. We explain this phenomenon on the basis of the different potential of zero charge of the two metals that largely influence the electronic properties of the TiO2 island film. © 2013 American Chemical Society.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.
Resumo:
Few studies have examined the effects of parental MS on children, and those that have suffered from numerous methodological weaknesses, some of which are addressed in this study. This study investigated the effects of parental MS on children by comparing youth of a parent with MS to youth who have no family member with a serious health condition on adjustment outcomes, caregiving, attachment and family functioning. A questionnaire survey methodology was used. Measures included youth somatisation, health, pro-social behaviour, behavioural-social difficulties, caregiving, attachment and family functioning. A total of 126 youth of a parent with MS were recruited from MS Societies in Australia and, were matched one-to-one with youth who had no family member with a health condition drawn from a large community sample. Comparisons showed that youth of a parent with MS did not differ on any of the outcomes except for peer relationship problems: adolescent youth of a parent with MS reported lower peer relationship problems than control adolescents. Overall, results did not support prior research findings suggesting adverse impacts of parental MS on youth.