958 resultados para Group Key Exchange


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This is the second half of a two-part paper dealing with the social theoretic assumptions underlying system dynamics. In the first half it was concluded that analysing system dynamics using traditional, paradigm-based social theories is highly problematic. An innovative and potentially fruitful resolution is now proposed to these problems. In the first section it is argued that in order to find an appropriate social theoretic home for system dynamics it is necessary to look to a key exchange in contemporary social science: the agency/structure debate. This debate aims to move beyond both the theories based only on the actions of individual human agents, and those theories that emphasise only structural influences. Emerging from this debate are various theories that instead aim to unite the human agent view of the social realm with views that concentrate solely on system structure. It is argued that system dynamics is best viewed as being implicitly grounded in such theories. The main conclusion is therefore that system dynamics can contribute to an important part of social thinking by providing a formal approach for explicating social mechanisms. This conclusion is of general significance for system dynamics. However, the over-arching aim of the two-part paper is to increase the understanding of system dynamics in related disciplines. Four suggestions are therefore offered for how the system dynamics method might be extended further into the social sciences. It is argued that, presented in the right way, the formal yet contingent feedback causality thinking of system dynamics should diffuse widely in the social sciences and make a distinctive and important contribution to them. Felix qui potuit rerum cognoscere causas Happy is he who comes to know the causes of things Virgil - Georgics, Book II, line 490. 29 BCE

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We describe a free space quantum cryptography system which is designed to allow continuous unattended key exchanges for periods of several days, and over ranges of a few kilometres. The system uses a four-laser faint-pulse transmission system running at a pulse rate of 10MHz to generate the required four alternative polarization states. The receiver module similarly automatically selects a measurement basis and performs polarization measurements with four avalanche photodiodes. The controlling software can implement the full key exchange including sifting, error correction, and privacy amplification required to generate a secure key.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We propose a new approach for secret key exchange involving the variation of the cavity length of an ultra-long fibre laser. The scheme is based on the realisation that the free spectral range of the laser cavity can be used as an information carrier. We present a proof-of-principle demonstration of this new concept using a 50-km-long fibre laser to link two users, both of whom can randomly add an extra 1-km-long fibre segment.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In the first paper of this series (Albuquerque & Brandão, 2004) we revised the Vezenyii species group of the exclusively Neotropical solenopsidine (Myrmicinae) ant genus Oxyepoecus. In this closing paper we update distribution information on the Vezenyii group species and revise the other Oxyepoecus species-group (Rastratus). We describe two species (Oxyepoecus myops n. sp. and O. rosai n. sp.) and redescribe previously known species of the group [O. daguerrei (Santschi, 1933), O. mandibularis (Emery, 1913), O. plaumanni Kempf, 1974, O. rastratus Mayr, 1887, and O. reticulatus Kempf, 1974], adding locality records and comments on the meagre biological data of these species. We also present an identification key to Oxyepoecus species based on workers.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Traditional approaches to evaluate performance in hotels, have mainly used financial measures. Building on Speckbacher et al. (2003), this Work Project aims to design and propose a Balanced Scorecard Type II as a performance measurement/management system for the hospitality industry based on data collected at the Luxury Brand Hotels of Pestana Group. The main contribution is to better align the vision, strategy and financial and non-financial performance measures in this category of hotels, in particular those of Pestana Group, and by doing so, lead their managers to focus on what is really critical and, consequently improve the overall performance.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A key to species groups of the genus Belostoma Latreille, 1807, using new taxonomic characters are presented as well as the revision of the four species included in the denticolle group: B. denticolle Montandon, 1903, and three new species: B. orbiculatum from eastern Argentina and southern Brazil, B. retusum from eastern Argentina and B. amazonum from northern Brazil which are described and illustrated.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The bufonid toad Chaunus achavali, a recently described species known only from Uruguay, is recorded for Brazil. This species is morphologically similar to C. ictericus and C. arenarum, and several individuals were labeled in Brazilian scientific collections under these taxa. A lectotype of C. arenarum is designated. Additional field notes on C. achavali and a key for the identification of the species in the Chaunus marinus group are presented.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Acanthagrion cuyabae Calvert, 1909 was described based on a male from State of Mato Grosso, Brazil. The female of this species was described based on morphological characters of four individuals collected in copula from State of Mato Grosso do Sul, and three other specimens of same locality. Acanthagrion cuyabae is here revalidated based on morphological characters of the female. Illustrated keys to the groups of Acanthagrion Selys, 1876 and species of the viridescens group occurring in Brazil are provided.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The male and female of Lutzomyia carmelinoi n.sp., and the female only of L. baculus and L. williamsi, (Diptera:Psychodidae) are described and illustrated from specimens collected in Pará state, Brazil. A pictorial key is presented to these and the other members of the walkeri group.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract The solvability of the problem of fair exchange in a synchronous system subject to Byzantine failures is investigated in this work. The fair exchange problem arises when a group of processes are required to exchange digital items in a fair manner, which means that either each process obtains the item it was expecting or no process obtains any information on, the inputs of others. After introducing a novel specification of fair exchange that clearly separates safety and liveness, we give an overview of the difficulty of solving such a problem in the context of a fully-connected topology. On one hand, we show that no solution to fair exchange exists in the absence of an identified process that every process can trust a priori; on the other, a well-known solution to fair exchange relying on a trusted third party is recalled. These two results lead us to complete our system model with a flexible representation of the notion of trust. We then show that fair exchange is solvable if and only if a connectivity condition, named the reachable majority condition, is satisfied. The necessity of the condition is proven by an impossibility result and its sufficiency by presenting a general solution to fair exchange relying on a set of trusted processes. The focus is then turned towards a specific network topology in order to provide a fully decentralized, yet realistic, solution to fair exchange. The general solution mentioned above is optimized by reducing the computational load assumed by trusted processes as far as possible. Accordingly, our fair exchange protocol relies on trusted tamperproof modules that have limited communication abilities and are only required in key steps of the algorithm. This modular solution is then implemented in the context of a pedagogical application developed for illustrating and apprehending the complexity of fair exchange. This application, which also includes the implementation of a wide range of Byzantine behaviors, allows executions of the algorithm to be set up and monitored through a graphical display. Surprisingly, some of our results on fair exchange seem contradictory with those found in the literature of secure multiparty computation, a problem from the field of modern cryptography, although the two problems have much in common. Both problems are closely related to the notion of trusted third party, but their approaches and descriptions differ greatly. By introducing a common specification framework, a comparison is proposed in order to clarify their differences and the possible origins of the confusion between them. This leads us to introduce the problem of generalized fair computation, a generalization of fair exchange. Finally, a solution to this new problem is given by generalizing our modular solution to fair exchange

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The recommendation to reduce saturated fatty acid (SFA) consumption to ≤10% of total energy (%TE) is a key public health target aimed at lowering cardiovascular disease (CVD) risk. Replacement of SFA with unsaturated fats may provide greater benefit than replacement with carbohydrates, yet the optimal type of fat is unclear. The aim was to develop a flexible food-exchange model to investigate the effects of substituting SFAs with monounsaturated fatty acids (MUFAs) or n-6 (ω-6) polyunsaturated fatty acids (PUFAs) on CVD risk factors. In this parallel study, UK adults aged 21-60 y with moderate CVD risk (50% greater than the population mean) were identified using a risk assessment tool (n = 195; 56% females). Three 16-wk isoenergetic diets of specific fatty acid (FA) composition (%TE SFA:%TE MUFA:%TE n-6 PUFA) were designed using spreads, oils, dairy products, and snacks as follows: 1) SFA-rich diet (17:11:4; n = 65); 2) MUFA-rich diet (9:19:4; n = 64); and 3) n-6 PUFA-rich diet (9:13:10; n = 66). Each diet provided 36%TE total fat. Dietary targets were broadly met for all intervention groups, reaching 17.6 ± 0.4%TE SFA, 18.5 ± 0.3%TE MUFA, and 10.4 ± 0.3%TE n-6 PUFA in the respective diets, with significant overall diet effects for the changes in SFA, MUFA, and n-6 PUFA between groups (P < 0.001). There were no differences in the changes of total fat, protein, carbohydrate, and alcohol intake or anthropometric measures between groups. Plasma phospholipid FA composition showed changes from baseline in the proportions of total SFA, MUFA, and n-6 PUFA for each diet group, with significant overall diet effects for total SFA and MUFA between groups (P < 0.001). In conclusion, successful implementation of the food-exchange model broadly achieved the dietary target intakes for the exchange of SFA with MUFA or n-6 PUFA with minimal disruption to the overall diet in a free-living population. This trial was registered at clinicaltrials.gov as NCT01478958.