940 resultados para SELECTIVE ENCRYPTION
Resumo:
We examine the nature and extent of statutory executive stock option (ESO) disclosures by Australian listed companies over the 2001 to 2004 period, and the influence of corporate governance mechanisms on these disclosures. Our results show a progressive increase in overall compliance from 2001 to 2004. However, despite the improved compliance, the results reveal managements’ continued reluctance to disclose more sensitive ESO information. Factors associated with good internal governance, including board independence, audit committee independence and effectiveness, and compensation committee independence and effectiveness are found to contribute to improved compliance. Similarly, certain external governance factors are associated with improved disclosure, including external auditor quality, shareholder activism (as proxied by companies identified as poor performers by the Australian Shareholders’ Association), and regulatory intervention.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
Carbon nanotubes (CNTs) are expected to become the ideal constituent of many technologes, in particular for future generation electronics. This considerable interest is due to their unique electrical and mechanical properties. They show indeed super-high current-carrying capacity, ballistic electron transport and good field-emission properties. Then, these superior features make CNTs the most promising building blocks for electronic devices, as organic solar cells and organic light emitting devices (OLED). By using Focused Ion Beam (FIB) patterning it is possible to a obtain a high control on position, relative distances and diameter of CNTs. The present work shows how to grow three-dimensional architecture made of vertical-aligned CNTs directly on silicon. Thanks to the higher activity of a pre-patterned surface the synthesis process results very quick, cheap and simple. Such large area growths of CNTs could be used in preliminary test for application as electrodes for organic solar cells.
Resumo:
The effects of exercise and breakfast manipulations on mood and motivation to eat were assessed in 11 healthy females who were regular exercisers and habitual breakfast eaters. The study involved a two by two repeated-measures design, with exercise (or no exercise) and a high-energy breakfast (or low-energy breakfast) as the repeated measures. The exercise or no-exercise session (0800 h) was followed by consumption of the low- or high-energy breakfast (0900 h). An ad libitum lunch test meal was provided 4 hours after the beginning of the exercise session (1200 h). Mood and motivation to eat were continuously tracked from 0800 until 1700 h by an electronic appetite ratings system (EARS). In general, morning subjective mood states (e.g., contentment) were significantly lower in the low-energy breakfast condition, but exercise reversed this effect. Exercise also significantly decreased feelings of lethargy, independent of the breakfast condition. Desire-to-eat and fullness ratings were significantly increased in the low-energy breakfast and high-energy breakfast conditions, respectively. Impairments of mood disappeared in the afternoon after consumption of an ad libitum lunch. In these healthy young adults, the condition inducing the largest energy deficit (exercise and low-energy breakfast) was not associated with the lowest mental states.
Resumo:
Data breach notification laws require organisations to notify affected persons or regulatory authorities when an unauthorised acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data has been encrypted. There are three types of safe harbour: an exemption; a rebuttable presumption and factor-based analysis. We demonstrate, using three condition-based scenarios, that the broad formulation of most encryption safe harbours is based on the flawed assumption that encryption is the silver bullet for personal information protection. We then contend that reliance upon an encryption safe harbour should be dependent upon a rigorous and competent risk-based review that is required on a case-by-case basis. Finally, we recommend the use of both an encryption safe harbour and a notification trigger as our preferred choice for a data breach notification regulatory framework.
Resumo:
Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.
Resumo:
The absence of cellular immunity is central to the pathogenesis of herpesvirus-mediated diseases after allogeneic hemopoietic stem cell transplantation (HSCT). For both bone marrow (BM)– and granulocyte-colony stimulating factor–mobilized peripheral blood stem cells (PBSCs) HSCT, donor-derived Epstein-Barr virus (EBV) and cytomegalovirus (CMV) peptide–specific CD8+ T cells clones undergo early expansion and persist long-term, with additional diversification arising from novel antigen-specific clones from donor-derived progenitors. Whether BM or PBSC is the superior source of antiviral CD8+ T cells is unclear. Given that PBSC has largely replaced BM as a source of stem cells for HSCT, it is unlikely that herpesvirus effector T-cell reconstitution will ever be compared prospectively. PBSC grafts contain 10 to 30 times more T cells than BM and a randomized study found proven viral infections were more frequent in BM than PBSC recipients, suggesting viral-specific T-cell immunity is enhanced in PBSC. Recently Moss showed in lung cancer patients that herpesvirus-specific BM-derived CD8+ T cells have unique homing properties relative to herpesvirus-specific CD8+ T cells present in unmobilized peripheral blood (PB). Immunodominant EBV-lytic peptide–specific CD8+ T cells were enriched in BM but were reduced for CMV peptide–specific CD8+ T cells relative to PB. EBV-latent peptide–specific CD8+ T cells were equivalent, which has relevance in the context of posttransplantation lymphoproliferative disorder for which impaired EBV-latent CD8+ T-cell immunity is a risk-factor. A comparison of herpesvirus-specific cellular immunity in PBSC versus PB has yet to be performed.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
The effective removal of pollutants using a thermally and chemically stable substrate that has controllable absorption properties is a goal of water treatment. In this study, the surfaces of thin alumina (γ-Al2O3) nanofibres were modified by the grafting either of two organosilane agents, 3-chloro-propyl-triethoxysilane (CPTES) and octyl-triethoxysilane (OTES). These modified materials were then trialed as absorbents for the removal of two herbicides, alachlor and imazaquin from water. The formation of organic groups during the functionalisation process established super hydrophobic sites on the surfaces of the nanofibres. This super hydrophobic group is a kind of protruding adsorption site which facilitates the intimate contact with the pollutants. OTES grafted substrate were shown to be more selective for alachlor while imazaquin selectivity is shown by the CPTES grafted substrate. Kinetics studies revealed that imazaquin was rapidly adsorbed on CPTES-modified surfaces. However, the adsorption of alachlor by OTES grafted surface was achieved more slowly.
Resumo:
Stimulated by the efficacy of copper (I) catalysed Huisgen-type 1,3-dipolar cycloaddition of terminal alkynes and organic azides to generate 1,4-disubstituted 1,2,3-triazole derivatives, the importance of ‘click’ chemistry in the synthesis of organic and biological molecular systems is ever increasing.[1] The mild reaction conditions have also led to this reaction gaining favour in the construction of interlocked molecular architectures.[2-4] In the majority of cases however, the triazole group simply serves as a covalent linkage with no function in the resulting organic molecular framework. More recently a renewed interest has been shown in the transition metal coordination chemistry of triazole ligands.[3, 5, 6] In addition novel aryl macrocyclic and acyclic triazole based oligomers have been shown to recognise halide anions via cooperative triazole C5-H….anion hydrogen bonds.[7] In light of this it is surprising the potential anion binding affinity of the positively charged triazolium motif has not, with one notable exception,[8] been investigated. With the objective of manipulating the unique topological cavities of mechanically bonded molecules for anion recognition purposes, we have developed general methods of using anions to template the formation of interpenetrated and interlocked structures.[9-13] Herein we report the first examples of exploiting the 1,2,3-triazolium group in the anion templated formation of pseudorotaxane and rotaxane assemblies. In an unprecedented discovery the bromide anion is shown to be a superior templating reagent to chloride in the synthesis of a novel triazolium axle containing [2]rotaxane. Furthermore the resulting rotaxane interlocked host system exhibits the rare selectivity preference for bromide over chloride...