59 resultados para Repudiation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter draws on biographical data about two notable pattern designers of wall surfaces in the interior. Both had personal histories of multiple careers and geographical locations and both their lives ended in mysterious circumstances. One of the pattern designers, Jim Thompson, disappeared in the Malaysian highlands in 1967 and was never found. The other, Florence Broadhurst, was brutally murdered in 1977; her case remains unsolved. This chapter theorizes that the patterned surface attracted Broadhurst and Thompson as a space to occupy and record their divergent pasts, and questions what it is to lose oneself in the surface of the interior, to find freedom (or slavery) in the abdication of control. This notion is further evidenced in creative works, including the Australian film Candy and the work by skin illustrator Emma Hack. What is it to work with the self as a two-dimensional representation in the outside world? Occupying the surface suggests a reflexive relationship with identity, that makes-over and re-shapes truths, lies and re-constructions. The chapter reminds us that the surface is never in stasis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work investigates the role of narrative literature in late-20th century and contemporary Anglo-American moral philosophy. It aims to show the trend of reading narrative literature for purposes of moral philosophy from the 1970 s and early 80 s to the present day as a part of a larger movement in Anglo-American moral philosophy, and to present a view of its significance for moral philosophy overall. Chapter 1 provides some preliminaries concerning the view of narrative literature which my discussion builds on. In chapter 2 I give an outline of how narrative literature is considered in contemporary Anglo-American moral philosophy, and connect this use to the broad trend of neo-Aristotelian ethics in this context. In chapter 3 I connect the use of literature to the idea of the non-generalizability of moral perception and judgment, which is central to the neo-Aristotelian trend, as well as to a range of moral particularisms and anti-theoretical positions of late 20th century and contemporary ethics. The joint task of chapters 2 and 3 is to situate the trend of reading narrative literature for the purposes of moral philosophy in the present context of moral philosophy. In the following two chapters, 4 and 5, I move on from the particularizing power of narrative literature, which is emphasized by neo-Aristotelians and particularists alike, to a broader under-standing of the intellectual potential of narrative literature. In chapter 4 I argue that narrative literature has its own forms of generalization which are enriching for our understanding of the workings of ethical generalizations in philosophy. In chapter 5 I discuss Iris Murdoch s and Martha Nussbaum s respective ways of combining ethical generality and particularity in a philosophical framework where both systematic moral theory and narrative literature are taken seriously. In chapter 6 I analyse the controversy between contemporary anti-theoretical conceptions of ethics and Nussbaum s refutation of these. I present my suggestion for how the significance of the ethics/literature discussion for moral philosophy can be understood if one wants to overcome the limitations of both Nussbaum s theory-centred, equilibrium-seeking perspective, and the anti-theorists repudiation of theory. I call my position the inclusive approach .

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A ideia central da pesquisa foi promover uma aproximação das narrativas visuais de Getúlio Damado e Roger Mello e a partir daí evidenciar os processos cognitivos e as estratégias que envolveram a estruturação de suas identidades sociais e linguagens artísticas contemporâneas, bem como destacar o ludismo e o acesso ao universo da infância e a cultura popular que ambos ressignificam em suas obras. Além disso, buscou-se comentar e avaliar momentos específicos de desprestígio e repúdio versus consagração ocorridos com os artistas. Para tal, essas produções foram contextualizadas como produções culturais em constante processo de mutação, do qual participam tanto eventos históricos como de inovação tecnológica, em contínua construção. Essas linguagens estão submetidas a uma grande velocidade e a superposição de influências. Outro ponto destacado nas analises foi o caráter de subjetividade dessas produções, identificadas como práticas estéticas promotoras de transformação política; de mobilização; ou também por sua capacidade de operar com o uso simbólico dos brinquedos e livros infantojuvenis recuperando-lhes o uso original. Os devaneios, o ludismo infantil e a cultura popular presentes nos objetos feitos de sucata e livros ilustrados foram confrontados com práticas consoantes, ou de discursos abrangentes, correntes no mundo da arte ou outras vezes aproximados de enfoques locais. Além da possibilidade de convergência entre as produções foram destacadas também muitas diferenças, e, sobretudo evidenciadas as potencialidades que podem advir da cultura popular como campo exploratório de pesquisa, bem como de sua ressignificação

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a layered architecture for secure e-commerce applications and protocols with fully automated dispute-resolution process, robust to communication failures and malicious faults. Our design is modular, with precise yet general-purpose interfaces and functionalities, and allows usage as an underlying secure service to different e-commerce, e-banking and other distributed systems. The interfaces support diverse, flexible and extensible payment scenarios and instruments, including direct buyer-seller payments as well as (the more common) indirect payments via payment service providers (e.g. banks). Our design is practical, efficient, and ensures reliability and security under realistic failure and delay conditions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

在随机Oracle模型的基础上, 提出一种基于单向陷门置换(trapdoor permutations, TDPs)的、可并行的、长消息签密方案——PLSC (parallel long-message signcryption). 该方法采用“整体搅乱, 局部加密(scramble all, and encrypt small)”的思想, 用一个伪随机数对要传送的消息和用户的身份(ID)进行“搅乱(scrambling operation)”, 然后对两个固定长度的小片段(并行地)进行单向陷门置换(TDP)操作. 这种设计使得整个方案可直接高效地处理任意长度的消息, 既可避免循环调用单向陷门置换(如CBC模式)所造成的计算资源的极度消耗, 也可避免由“对称加密方案”与“签密方案”进行“黑盒混合(black-box hybrid)”所造成的填充(padding)冗余. 不仅可以显著地节约消息带宽, 而且可以显著地提高整体效率. 具体地说, 该方法对任何长度的消息进行签密, 仅需进行一次接收方的TDP运算(相当于加密), 以及一次发送方的TDP运算(相当于签名), 从而最大限度地降低了TDP运算的次数, 提高了整体的运算效率. 因为, 对于公钥加密算法来说, 运算量主要集中在TDP运算上, TDP运算是整个算法的瓶颈所在. 另一方面, 由于避免了填充上的冗余, 新方案的效率也高于标准的“黑盒混合”方案.重要的是, 新方案能够达到选择密文攻击下的紧致的语义安全性(IND- CCA2)、密文完整性(INT-CTXT)以及不可否认性(non-repudiation). 而且所有这些安全要求都可以在多用户(multi-user)、内部安全(insider-security)的环境下得以实现. 另外, 尽管新方案主要针对长消息的签密, 但它也可应用于某些不能进行大块数据处理的环境(智能卡或其他只有少量内存的环境). 也就是说, 对于这些小内存设备来说, 仍然可以用该方案来实现长消息的签密处理.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

From tendencies to reduce the Underground Railroad to the imperative "follow the north star" to the iconic images of Ruby Bridges' 1960 "step forward" on the stairs of William Frantz Elementary School, America prefers to picture freedom as an upwardly mobile development. This preoccupation with the subtractive and linear force of development makes it hard to hear the palpable steps of so many truant children marching in the Movement and renders illegible the nonlinear movements of minors in the Underground. Yet a black fugitive hugging a tree, a white boy walking alone in a field, or even pieces of a discarded raft floating downstream like remnants of child's play are constitutive gestures of the Underground's networks of care and escape. Responding to 19th-century Americanists and cultural studies scholars' important illumination of the child as central to national narratives of development and freedom, "Minor Moves" reads major literary narratives not for the child and development but for the fugitive trace of minor and growth.

In four chapters, I trace the physical gestures of Nathaniel Hawthorne's Pearl, Harriet Beecher Stowe's Topsy, Harriet Wilson's Frado, and Mark Twain's Huck against the historical backdrop of the Fugitive Slave Act and the passing of the first compulsory education bills that made truancy illegal. I ask how, within a discourse of independence that fails to imagine any serious movements in the minor, we might understand the depictions of moving children as interrupting a U.S. preoccupation with normative development and recognize in them the emergence of an alternative imaginary. To attend to the movement of the minor is to attend to what the discursive order of a development-centered imaginary deems inconsequential and what its grammar can render only as mistakes. Engaging the insights of performance studies, I regard what these narratives depict as childish missteps (Topsy's spins, Frado's climbing the roof) as dances that trouble the narrative's discursive order. At the same time, drawing upon the observations of black studies and literary theory, I take note of the pressure these "minor moves" put on the literal grammar of the text (Stowe's run-on sentences and Hawthorne's shaky subject-verb agreements). I regard these ungrammatical moves as poetic ruptures from which emerges an alternative and prior force of the imaginary at work in these narratives--a force I call "growth."

Reading these "minor moves" holds open the possibility of thinking about a generative association between blackness and childishness, one that neither supports racist ideas of biological inferiority nor mandates in the name of political uplift the subsequent repudiation of childishness. I argue that recognizing the fugitive force of growth indicated in the interplay between the conceptual and grammatical disjunctures of these minor moves opens a deeper understanding of agency and dependency that exceeds notions of arrested development and social death. For once we interrupt the desire to picture development (which is to say the desire to picture), dependency is no longer a state (of social death or arrested development) of what does not belong, but rather it is what Édouard Glissant might have called a "departure" (from "be[ing] a single being"). Topsy's hard-to-see pick-pocketing and Pearl's running amok with brown men in the market are not moves out of dependency but indeed social turns (a dance) by way of dependency. Dependent, moving and ungrammatical, the growth evidenced in these childish ruptures enables different stories about slavery, freedom, and childishness--ones that do not necessitate a repudiation of childishness in the name of freedom, but recognize in such minor moves a fugitive way out.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Examines the Cambridge County Court ruling in Volkswagen Financial Services (UK) Ltd v Ramage on whether a clause in a car hire contract which allowed the finance company, upon repudiation of the contract after the hirer fell into arrears, to claim compensation equivalent to the lost future rental payments was unenforceable as a penalty clause, rather than being a reasonable pre-estimate of actual loss. Refers to case law including the Court of Appeal ruling in Anglo Auto Finance Co v James in considering the differing losses which would occur during the course of the hire term according to the natural depreciation of the value of the car. Notes the reasoning of the Court on: (1) contracts of hire compared with hire purchase agreements; (2) the comparative position of the parties and the freedom to contract elsewhere; and (3) the reasonable prediction of future losses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past research has frequently attributed the incidence of bank failures to macroeconomic cycles and/or downturns in the regional economy. More recent analyses have suggested that the incidence and severity of bank failures can be linked to governance failures, which may be preventable through more stringent disclosure and auditing requirements. Using data on bank failures during the years 1991 to 1997, for the US, Canada, the UK and Germany, this study examines the relationship between institutional characteristics of national legal and auditing systems and the incidence of bank failures. In the second part of our analysis we then examined the relationship between the same institutional variables and the severity of bank failures.
The first part of our study notes a significant correlation between the law and order tradition (‘rule of law’) of a national legal system and the incidence of bank failures. Nations which were assigned high 'rule of law’ scores by country risk guides appear to have been less likely to experience bank failures. Another variable which appears to impact on bank failure rates is the ‘risk of contract repudiation’. Countries with a greater ‘risk of contract repudiation’ appear to be more likely to experience bank failures. We suggest that this may be due to a greater ex ante protection of stakeholders in countries where contract enforcement is more stringent.
The results of the second part of our study are less clear cut. However, there appears to be a significant correlation between the amount paid out by national deposit insurers (our proxy for the severity of bank failures) and the macroeconomic variable 'GDP change'. Here our findings follow the conventional wisdom; with greater amounts of deposit insurance funds being paid during economic downturns (i.e. low or negative GDP 'growth' correlates with high amounts of deposit insurance being paid out). A less pronounced relationship with the severity of bank failures can also be established for the institutional variables ' accounting standards' as well as 'risk of contract repudiation'. Countries with more stringent ‘accounting standards’ and a low ‘risk of contract repudiation’ appear to have been less prone to severe bank failures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract (Re)thinking Bodies: Deleuze and Guattari 's becoming-woman seeks to explore the notion of becoming-woman, as put forth by Gilles Deleuze and Felix Guattari in their collaborative 1982 text, A Thousand Plateaus: Capitalism and Schizophrenia, and as received by such prominent feminist theorists as Rosi Braidotti and Elizabeth Grosz. Arguing that the fairly decisive repudiation of this concept by some feminist theorists has been based on a critical misunderstanding, this project endeavors to clarify becomingwoman by exploring various conceptions of the body put forth by Baruch de Spinoza, Friedrich Nietzsche and Simone de Beauvoir. These conceptions of the body are indispensible to an appreciation of Deleuze and Guattari's notion of a body lived on both an immanent and transcendent plane, which, in turn, is indispensable to an appreciation of the concept of becoming (and, in particular, the concept of becoming-woman) as intended by Deleuze and Guattari.