621 resultados para outsourcing decryption


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social media tools are starting to become mainstream and those working in the software development industry are often ahead of the game in terms of using current technological innovations to improve their work. With the advent of outsourcing and distributed teams the software industry is ideally placed to take advantage of social media technologies, tools and environments. This paper looks at how social media is being used by early adopters within the software development industry. Current tools and trends in social media tool use are described and critiqued: what works and what doesn't. We use industrial case studies from platform development, commercial application development and government contexts which provide a clear picture of the emergent state of the art. These real world experiences are then used to show how working collaboratively in geographically dispersed teams, enabled by social media, can enhance and improve the development experience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the fact that customer retention is crucial for providers of cloud enterprise systems, only little attention has been directed towards investigating the antecedents of subscription renewal in an organizational context. This is even more surprising, as cloud services are usually offered as subscription-based pricing models with the (theoretical) possibility of immediate service cancellation, strongly opposing classical long-term IT-Outsourcing contracts or license-based payment plans of on premise enterprise systems. To close this research gap an empirical study was undertaken. Firstly, a conceptual model was drawn from theories of social psychology, organizational system continuance and IS success. The model was subsequently tested using survey responses of senior management within companies which adopted cloud enterprise systems. Gathered data was then analysed using PLS. The results indicate that subscription renewal intention is influenced by both – social-related and technology-specific factors – which are able to explain 50.4% of the variance in the dependent variable. Beneath the cloud enterprise systems specific contributions, the work advances knowledge in the area of organizational system continuance, as well as IS success.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Shared Services involves the convergence and streamlining of an organisation’s functions to ensure timely service delivery as effectively and efficiently as possible. This would result in lower cost, improved service delivery and economies of scale. The conventional wisdom of today is that the potential for Shared Services is increasing due to the increasing costs of changing systems and business requirements and also in implementing and running information systems (IS). However many organizations opt instead for an outsourcing arrangement as the alternative towards cost savings, due in essence to a lack of realization of this potential for Shared Services. This paper rationales turning from outsourcing (to looking within organisations) to leverage on Shared Services for similar cost savings and reaping other potential benefits. The paper’s objectives and contributions are three-fold: (1) distinguish between Shared Services and Outsourcing, (2) report on insights from a single Australian university case study through a transaction cost lens, and to demonstrate the potential for Shared Services and (3) develop a decision model to gauge the potential of implementing Shared Services across similar organisations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The last two decades have witnessed a fragmentation of previously integrated systems of production and service delivery with the advent of boundary-less, networked and porous organisational forms. This trend has been associated with the growth of outsourcing and increased use of contingent workers. One consequence of these changes is the development of production/service delivery systems based on complex national and international networks of multi-tiered subcontracting increasingly labelled as supply chains. A growing body of research indicates that subcontracting and contingent work arrangements affect design and decision-making processes in ways that can seriously undermine occupational health and safety (OHS). Elaborate supply chains also present a regulatory challenge because legal responsibility for OHS is diffused amongst a wider array of parties, targeting key decision-makers is more difficult, and government agencies encounter greater logistical difficulties trying to safeguard contingent workers. In a number of industries these problems have prompted new forms of regulatory intervention, including mechanisms for sheeting legal responsibility to the top of supply chains, contractual tracking devices and increasing industry, union and community involvement in enforcement. After describing the problems just alluded to this paper examines recent efforts to regulate supply chains to safeguard OHS in the United Kingdom and Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New public management (NPFM), with its hands-on, private sector-style performance measurement, output control, parsimonious use of resources, disaggreation of public sector units and greater competition in the public sector, has significantly affected charitable and nonprofit organisations delivering community services (Hood, 1991; Dunleavy, 1994; George & Wilding, 2002). The literature indicates that nonprofit organisations under NPM believe they are doing more for less: while administration is increasing, core costs are not being met; their dependence on government funding comes at the expense of other funding strategies; and there are concerns about proportionality and power asymmetries in the relationship (Kerr & Savelsberg, 2001; Powell & Dalton, 2011; Smith, 2002, p. 175; Morris, 1999, 2000a). Government agencies are under increased pressure to do more with less, demonstrate value for money, measure social outcomes, not merely outputs and minimise political risk (Grant, 2008; McGreogor-Lowndes, 2008). Government-community service organisation relationships are often viewed as 'uneasy alliances' characterised by the pressures that come with the parties' differing roles and expectations and the pressures that come with the parties' differing roles and expectations and the pressurs of funding and security (Productivity Commission, 2010, p. 308; McGregor-Lowndes, 2008, p. 45; Morris, 200a). Significant community services are now delivered to citizens through such relationships, often to the most disadvantaged in the community, and it is important for this to be achieved with equity, efficiently and effectively. On one level, the welfare state was seen as a 'risk management system' for the poor, with the state mitigating the risks of sickness, job loss and old age (Giddens, 1999) with the subsequent neoliberalist outlook shifting this risk back to households (Hacker, 2006). At the core of this risk shift are written contracts. Vincent-Jones (1999,2006) has mapped how NPM is characterised by the use of written contracts for all manner of relations; e.g., relgulation of dealings between government agencies, between individual citizens and the state, and the creation of quais-markets of service providers and infrastructure partners. We take this lens of contracts to examine where risk falls in relation to the outsourcing of community services. First we examine the concept of risk. We consider how risk might be managed and apportioned between governments and community serivce organisations (CSOs) in grant agreements, which are quasiy-market transactions at best. This is informed by insights from the law and economics literature. Then, standard grant agreements covering several years in two jurisdictions - Australia and the United Kingdom - are analysed, to establish the risk allocation between government and CSOs. This is placed in the context of the reform agenda in both jurisdictions. In Australia this context is th enonprofit reforms built around the creation of a national charities regulator, and red tape reduction. In the United Kingdom, the backdrop is the THird Way agenda with its compacts, succeed by Big Society in a climate of austerity. These 'case studies' inform a discussion about who is best placed to bear and manage the risks of community service provision on behalf of government. We conclude by identifying the lessons to be learned from our analysis and possible pathways for further scholarship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

School curriculum change processes have traditionally been managed internally. However, in Queensland, Australia, as a response to the current high-stakes accountability regime, more and more principals are outsourcing this work to external change agents (ECAs). In 2009, one of the authors (a university lecturer and ECA) developed a curriculum change model (the Controlled Rapid Approach to Curriculum Change (CRACC)), specifically outlining the involvement of an ECA in the initiation phase of a school’s curriculum change process. The purpose of this paper is to extend the CRACC model by unpacking the implementation phase, drawing on data from a pilot study of a single school. Interview responses revealed that during the implementation phase, teachers wanted to be kept informed of the wider educational context; use data to constantly track students; relate pedagogical practices to testing practices; share information between departments and professional levels; and, own whole school performance. It is suggested that the findings would be transferable to other school settings and internal leadership of curriculum change. The paper also strikes a chord of concern – Do the responses from teachers operating in such an accountability regime live their professional lives within this corporate and globalised ideology whether they want to or not?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is increasing momentum within the construction industry to deploy distributed teams on projects, yet the major challenges that companies face for managing teams in distributed arrangements have yet to be explored in the construction context. Driven by such need, this study is intended to present an account of the major challenges encountered throughout the life cycle of offshore outsourcing arrangements within the South Australian construction industry. To this end, the study describes the observations made within the natural contexts of one construction project in terms of the challenges to the success of deploying distributed teams for outsourcing of works. Discussions remain in dialogue with relevant theories and the pertinent literature to explain the interpretations and lessons learned and to underpin the conclusions made. It is contended that this study contributes to the field by providing an illuminating insight into potential challenges facing distributed teams being implemented in outsourcing tasks in construction projects. Discussions also offer practical guidelines for construction project managers and assist them in dealing with potential challenges of offshore outsourcing through the lenses of distributed team working principles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Construction professional service (CPS) in the international arena has been very competitive despite that the industry is proliferating at a high rate. To excel in international business, CPS firms have the importance of building overseas competition strategies on a proper understanding of the international CPS (I-CPS) market. However, subject to borderless trade, information technology–based networking, global outsourcing, and changing forms of procurement, the I-CPS market structure has become more covert, intricate, and unstraightforward than before. Through examining business competition among top international design firms, this study aims to identify the attributes of the I-CPS market structure from two perspectives—concentration and turnover. Data from Engineering News-Record over the period 2001–2011 were collected to calculate market concentration ratios and turnover indices. The results show that I-CPS competition is characterized by atomism, much turbulence with a steady increase in competition intensity, and the predominant role of new entrants and exiting firms in market turnovers. The combination of concentration and turnover is found useful to address the attributes of the I-CPS market structure, which favors I-CPS firms to formulate international competition strategies in due ways.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to explore the contribution of global business services to improved productivity and economic growth of the world economy, which has gone largely unnoticed in service research. Design/methodology/approach The authors draw on macroeconomic data and industry reports, and link them to the non-ownership-concept in service research and theories of the firm. Findings Business services explain a large share of the growth of the global service economy. The fast growth of business services coincides with shifts from domestic production towards global outsourcing of services. A new wave of global business services are traded across borders and have emerged as important drivers of growth in the world’s service sector. Research limitations/implications This paper advances the understanding of non-ownership services in an increasingly global and specialized post-industrial economy. The paper makes a conceptual contribution supported by descriptive data, but without empirical testing. Originality/value The authors integrate the non-ownership concept and three related economic theories of the firm to explain the role of global business services in driving business performance and the international transformation of service economies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Supply chain outsourcing has posed problems for conventional labour regulation, which focuses on employers contracting directly with workers, particularly employees. These difficulties have been exacerbated by the traditional trifurcated approach to regulation of pay and conditions, work health and safety and workers’ compensation. This paper analyses the parallel interaction of two legal developments within the Australian textile, clothing and footwear industry. The first is mandatory contractual tracking mechanisms within state and federal labour laws and the second is the duties imposed by the harmonised Work Health and Safety Acts. Their combined effect has created an innovative, fully enforceable and integrated regulatory framework for the textile, clothing and footwear industry and, it is argued, other supply chains in different industry contexts. This paper highlights how regulatory solutions can address adverse issues for workers at the bottom of contractual networks, such as fissured workplaces and capital fragmentation, by enabling regulators to harness the commercial power of business controllers at the apex to ensure compliance throughout the entire chain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – While many studies have predominantly looked at the benefits and risks of cloud computing, little is known whether and to what extent institutional forces play a role in cloud computing adoption. The purpose of this paper is to explore the role of institutional factors in top management team’s (TMT’s) decision to adopt cloud computing services. Design/methodology/approach – A model is developed and tested with data from an Australian survey using the partial least squares modeling technique. Findings – The results suggest that mimetic and coercive pressures influence TMT’s beliefs in the benefits of cloud computing. The results also show that TMT’s beliefs drive TMT’s participation, which in turn affects the intention to increase the adoption of cloud computing solutions. Research limitations/implications – Future studies could incorporate the influences of local actors who might also press for innovation. Practical implications – Given the influence of institutional forces and the plethora of cloud-based solutions on the market, it is recommended that TMTs exercise a high degree of caution when deciding for the types of applications to be outsourced as organizational requirements in terms of performance and security will differ. Originality/value – The paper contributes to the growing empirical literature on cloud computing adoption and offers the institutional framework as an alternative lens with which to interpret cloud-based information technology outsourcing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Adopting a multi-theoretical approach, I examine external auditors’ perceptions of the reasons why organizations do or do not adopt cloud computing. I interview forensic accountants and IT experts about the adoption, acceptance, institutional motives, and risks of cloud computing. Although the medium to large accounting firms where the external auditors worked almost exclusively used private clouds, both private and public cloud services were gaining a foothold among many of their clients. Despite the advantages of cloud computing, data confidentiality and the involvement of foreign jurisdictions remain a concern, particularly if the data are moved outside Australia. Additionally, some organizations seem to understand neither the technology itself nor their own requirements, which may lead to poorly negotiated contracts and service agreements. To minimize the risks associated with cloud computing, many organizations turn to hybrid solutions or private clouds that include national or dedicated data centers. To the best of my knowledge, this is the first empirical study that reports on cloud computing adoption from the perspectives of external auditors.