997 resultados para Selective-ID security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Interesting wireless networking scenarios exist wherein network services must be guaranteed in a dynamic fashion for some priority users. For example, in disaster recovery, members need to be able to quickly block other users in order to gain sole use of the radio channel. As it is not always feasible to physically switch off other users, we propose a new approach, termed selective packet destruction (SPD) to ensure service for priority users. A testbed for SPD has been created, based on the Rice University Wireless open-Access Research Platform and been used to examine the feasibility of our approach. Results from the testbed are presented to demonstrate the feasibility of SPD and show how a balance between performance and acknowledgement destruction rate can be achieved. A 90% reduction in TCP & UDP traffic is achieved for a 75% MAC ACK destruction rate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With information warfare (IW) becoming a reality, the need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. With the shift from computer security to information warfare, logical transformation models (LTMS) were looked at as a solution to quantifying information system requirements. The paper will introduce the concepts involved with fourth generational models and it's application to IW. The basic advantages and disadvantages will also be discussed and presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt. This volume is essential reading for scholars, researchers, and practitioners interested inkeeping pace with the ever-growing field of Information Security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The major barriers to the Implementation of electronic commerce by businesses globally arc well understood. These comprise security and pnvacy issues, the lack of established regulations governing commercial behaviour and liability, and the lack of universally accepted standards. In this article. we focus on the security concerns of Australian SMEs. Medium, and especially small, enterprises are hindered in the implementation of communications security technology by a lack of expertize and a poor understandmg of the services and resources available to them. As a response to this situation, we examme the facilities avallable to Australian SMEs which help them to make reasonable e- secunty decisions as part of an overall e-busmess strategy. We demonstrate that there are sufficient resources at appropnate levels of availability to enable small and medium Australian enterprises to implement communicatlons security effectively.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ease of Internet accessibility has offered business the opportunity to incorporate this electronic infrastructure technology into establishing electronic-based supply chains. With the improved efficiency that this brings to the management and functionality of the supply chain, there are also security considerations that should be taken into account for protecting the integrity of the electronic supply chain, not only within each business node, but also across the entire supply chain. Such security vulnerabilities can be negated with the implementation of security measures and policies, however these need to be consistent throughout the supply chain and regularly assessed against security benchmarks in order to ensure they meet dequate security standards.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The phase behavior, hydrogen bonding interactions and morphology of poly(hydroxyether of bisphenol A) (phenoxy) and poly(var epsilon-caprolactone)-block-poly(2-vinyl pyridine) (PCL-b-P2VP) were investigated using differential scanning calorimetry (DSC), Fourier transform infrared (FTIR) spectroscopy, optical microscopy and atomic force microscopy (AFM). In this A-b-B/C type block copolymer/homopolymer system, both P2VP and PCL blocks have favorable intermolecular interaction towards phenoxy via hydrogen bonding. However, the hydrogen bonding between P2VP and phenoxy is significantly stronger than that between PCL and phenoxy. Selective hydrogen bonding between phenoxy/P2VP pair at lower phenoxy contents and co-existence of two competitive hydrogen bonding interactions between phenoxy/P2VP and phenoxy/PCL pairs at higher phenoxy contents were observed in the blends. This leads to the formation of a variety of composition dependent nanostructures including wormlike, hierarchical and core–shell morphologies. The blends became homogeneous at 95 wt% phenoxy where both blocks of the PCL-b-P2VP were miscible with phenoxy due to hydrogen bonding. In the end, a model was proposed to explain the microphase morphology of blends based on the experimental results obtained. The swelling of the PCL-b-P2VP block copolymer by phenoxy due to selective hydrogen bonding causes formation of different microphases

Relevância:

30.00% 30.00%

Publicador:

Resumo:

he prominence of global warming as an environmental issue has illustrated the close relationship between natural resources, ecosystems and global security. Whilst environmental decision making often uses techniques such as economic valuation and risk management, the security component is often not considered, at least not from a security analyst’s perspective. Yet environmental security considerations can be global, regional and/or national in impact. Environmental change and policy can effect human health and well being as well as initiating conflict; it can affect the existence of life itself. These aspects are firmly in the domain of the security discipline although the protection of the global ecosystem has not traditionally been considered by those who create security policy. The idea of environmental/ecological security ranges from the eco-centric approach which examines the impact of human activities that impact on the security of the natural systems to the more traditional anthropocentric perspectives that look at varied issues such as conflict caused by natural resource competition and environmental degradation, and the greening of military operations. This paper will assert that the inclusion of the security factor in policy creation and environmental assessments is essential to give richer solutions to these complex socio-economic and ecological situations. Systems theory over the last few decades has emphasised the inclusion of as many perspectives on messy problems as possible to provide truly systemic outcomes. It is posited that the addition of such concepts as threat analyses will produce more effective and sustainable outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ID scanners are quickly emerging as a new technological fix to long-standing problems of security and safety within licensed venues. Yet at this point in time detailed research of this rapidly expanding security technology is remarkably limited. To address this analytical deficit we are currently examining the uptake of ID scanners in licensed venues operating in the night-time economy. We have found significant interest in the implementation of ID scanners in other Australian cities. However, the introduction of ID scanners in late-night licensed venues has occurred with little public awareness, no policy consideration and questionable claims concerning their effectiveness in enhancing safety and reducing crime. This article explores the factors shaping the introduction of ID scanners and the underlying beliefs concerning their utility as a crime prevention technology. The article then considers some broader implications to be explored in future analyses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Computerised ID scanning technologies have permeated many urban night-time economies in Australia, the United States, Canada and the United Kingdom. This paper documents how one media organisation’s overt and tacit approval of ID scanners helped to normalise this form of surveillance as a precondition of entry into most licensed venues in the Australian city of Geelong. After outlining how processes of governance “from above” and “from below” interweave to generate distinct political and media demands for strategies to prevent localised crime problems, a chronological reconstruction of media reports over a three-and-a half year period demonstrates how ID scanning became the centrepiece of a holistic reform strategy to combat alcohol-related violence in this nightclub precinct. Several discursive techniques helped to normalise this “technological fix”, while suppressing critical discussion of viable concerns over information privacy, data security and system networking. These
included pairing reports of an initial “signal crime” with examples of “virtual victimhood” to stress the urgency of a radical surveillance-based response, which was supported by anecdotal statements from key “primary definers” highlighting the success of this initiative in targeting a wider population of antisocial “others”. The implications of these reporting practices are discussed in light of the media’s central role in reforming the Geelong night-time economy and broader trends in using novel surveillance technologies to combat urban crime problems at the expense of alternative measures that protect individual liberty.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Digital technologies are often considered effective methods of deterring or preventing crime. New forms of surveillance have particular appeal when attempting to reduce violence in the night-time economy, given ongoing concerns over perceived increases in the frequency and severity of reported assaults. This study examines the rationales for adopting compulsory patron ID scanning as a key method of reducing violence in and around licensed venues in the Victorian regional city of Geelong. Using a mixed methods approach, this paper challenges the popular perception that ID scanning has helped to reduce violence Geelong’s night-time economy. Further, the research identifies several limits in the administration of this technology that potentially undermine patron safety in the night-time economy. The authors conclude by proposing a series of reforms to address current regulatory gaps associated with ID scanning and related surveillance and identity authentication technologies to prevent crime.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ID scanners are promoted as an effective solution to the problems of anti-social behavior and violence in many urban nighttime economies. However, the acceptance of this and other forms of computerized surveillance to prevent crime and anti-social behavior is based on several unproven assumptions. After outlining what ID scanners are and how they are becoming a normalized precondition of entry into one Australian nighttime economy, this chapter demonstrates how technology is commonly viewed as the key to preventing crime despite recognition of various problems associated with its adoption. The implications of technological determinism amongst policy makers, police, and crime prevention theories are then critically assessed in light of several issues that key informants talking about the value of ID scanners fail to mention when applauding their success. Notably, the broad, ill-defined, and confused notion of “privacy” is analyzed as a questionable legal remedy for the growing problems of überveillance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently, the Big Data paradigm has received considerable attention since it gives a great opportunity to mine knowledge from massive amounts of data. However, the new mined knowledge will be useless if data is fake, or sometimes the massive amounts of data cannot be collected due to the worry on the abuse of data. This situation asks for new security solutions. On the other hand, the biggest feature of Big Data is "massive", which requires that any security solution for Big Data should be "efficient". In this paper, we propose a new identity-based generalized signcryption scheme to solve the above problems. In particular, it has the following two properties to fit the efficiency requirement. (1) It can work as an encryption scheme, a signature scheme or a signcryption scheme as per need. (2) It does not have the heavy burden on the complicated certificate management as the traditional cryptographic schemes. Furthermore, our proposed scheme can be proven-secure in the standard model. © 2014 Elsevier Inc. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring signature, which eliminates the process of certificate verification, can be used instead. In this paper, we further enhance the security of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that include this user still remain valid. This property is especially important to any large scale data sharing system, as it is impossible to ask all data owners to re-authenticate their data even if a secret key of one single user has been compromised. We provide a concrete and efficient instantiation of our scheme, prove its security and provide an implementation to show its practicality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the need of the companies in becoming more competitive within the market, it arises an incessant search for selective human potential, with a high level of capacity and low rotativity, which motivation results in production raise, quality optimization and waste reduction. This scenario requires a strategy development which advantages the Human Resources Quality Management. This way, the model of the Human System Audit (HSA), developed by the Spanish researchers Ouijano and Navarro, presents itself as an important tool to diagnosis and evaluation, contemplating the environment where the organization is inserted, its strategies, its organizational design, its processes and its organizational effectiveness. In this sense, the present study has identified the existent relation between the professional satisfaction and the Organizational Culture, based in the model HSA. The research has been a quantitative-descriptive one and has had as population the technical-administrative workers from the Federal Center of Technical Education of Rio Grande do Norte (CEFET RN). The data collection has occurred during May, 2008, by means of the application of a questionnaire in the HSA model. The sample was composed by 167 subjects, distributed among the Five units of the institution. It was used the factorial analysis, with the extraction method of main components and orthogonal rotation varimax, in order to extract the dimensions of the satisfaction and of the organizational culture and the calculation of Cronbach s Alpha coefficient, to evaluate the reliability of these dimensions. The factorial analysis of the satisfaction indicators has identified four factors,, all of them showing significance: gratefulness and relationship , self-realization , stability and security and physical conditions and social benefits . The result of the factorial analysis with the indicators of the organizational culture has extracted four factors and among them, three of them have obtained significance: Personal Satisfaction Style , Competitive-Denial-Power Style and the Conventional-Dependent Style . After identifying the dimensions of the satisfaction and culture found at CEFET-RN, it has been notice the existence or not of relation among them, through the application of Pearson s coefficient. It has been verified that all of the dimensions of the Professional satisfaction are correlated with some dimension of the organizational culture, having in outstand position, with higher intensity, the relation between the culture style of Personal Satisfaction and the satisfaction factor referring to the self-realization

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Gastrin-releasing peptide receptors (GRP-R) are upregulated in many cancers, including prostate, breast, and lung. We describe a new radiolabeled bombesin (BBN) analog for imaging and systemic radiotherapy that has improved pharmacokinetics (PK) and better retention of radioactivity in the tumor. METHODS: DO3A-CH2CO-G-4-aminobenzoyl-Q-W-A-V-G-H-L-M-NH2 (AMBA) was synthesized and radiolabeled. The human prostate cancer cell line PC-3 was used to determine the binding (Kd), retention, and efflux of 177Lu-AMBA. Receptor specificity was determined by in vitro autoradiography in human tissues. PK and radiotherapy studies were performed in PC-3 tumor-bearing male nude mice. RESULTS: 177Lu-AMBA has a high affinity for the GRP-R (Kd, 1.02 nmol/L), with a maximum binding capacity (Bmax) of 414 fmol/10(6) cells (2.5 x 10(5) GRP-R/cell). Internalization was similar for 177Lu-AMBA (76.8%), 177Lu-BBN8 (72.9%), and 125I-[Tyr4]-BBN (74.9%). Efflux was markedly lower for 177Lu-AMBA (2.9%) compared with 177Lu-BBN8 (15.9%) and 125I-[Tyr4]-BBN (46.1%). By receptor autoradiography, Lu-AMBA binds specifically to GRP-R (0.8 nmol/L) and to the neuromedin B receptor (NMB-R) (0.9 nmol/L), with no affinity for the bb3 receptor (>1,000 nmol/L). 177Lu-AMBA was renally excreted (55 %ID 1 h [percentage injected dose at 1 h]); tumor uptake at 1 and 24 h was 6.35 %ID/g and 3.39 %ID/g, respectively. One or 2 doses of 177Lu-AMBA (27.75 MBq/dose) significantly prolonged the life span of PC-3 tumor-bearing mice (P < 0.001 and P < 0.0001, respectively) and decreased PC-3 tumor growth rate over controls. When compared using World Health Organization criteria, mice receiving 2 doses versus 1 dose of 177Lu-AMBA demonstrated a shift away from stable/progressive disease toward complete/partial response; by RECIST (Response Evaluation Criteria in Solid Tumors), median survival increased by 36% and time to progression/progression-free survival increased by 65%. CONCLUSION: 177Lu-AMBA binds with nanomolar affinity to GRP-R and NMB-R, has low retention of radioactivity in kidney, demonstrates a very favorable risk-benefit profile, and is in phase I clinical trials.