756 resultados para Privacy, Right of.
Resumo:
Principle 7 of the Declaration of the Rights of the Child (UN General Assembly, 1959) states in part: "The child has the right to receive education which will be free and compulsory ... You will be given an education that promotes their general education and training on an equal opportunity to develop their individual judgment skills and sense of moral and social responsibility, and to become a useful member of society. " I will expose to you that the school library resource center is the general instrument essential to fulfill this right of the child. Within the comprehensive range of materials and acquisition objective of their materials, school library complements and supports all aspects of the educational program.
Resumo:
This design-research thesis suggests that the improvement of North East Street performances by using Complete Streets, Green Street, Place Making and Context Sensitive Solution principles and practices. Heavily used by a variety of users, often conflicting with one another, University of Maryland Campus Drive would benefit from a major planning and design amelioration to meet the increasing demands of serving as a city main street. The goal of this thesis project is to prioritize the benefits for pedestrians in the right-of-way and improve the pedestrian experience. This goal also responds to the recent North East Street Extension Phrase I of economic renaissances. The goal of this design-research thesis will be achieved focusing on four aspects. First, the plans and designs will suggest to building mixed use blocks, increase the diversity of street economic types and convenience of people’s living. Second, design and plans will propose bike lanes, separate driving lanes from sidewalks and bike lanes by street tree planters, and narrow driving lanes to reduce vehicular traffic volume and speed in order to reduce pedestrian and vehicle conflicts. Third, plans and designs will introduce bioswales, living walls and raingardens to treat and reuse rain water. Finally, the plans and designs will seek to preserve local culture and history by adding murals and farmers market. The outcome of the design-research thesis project is expected to serve as an example of implementing Complete Streets, Green Street, Place Making and Context Sensitive Solution principles and practices in urban landscape, where transportation, environment and social needs interact with each other.
Resumo:
With wireless vehicular communications, Vehicular Ad Hoc Networks (VANETs) enable numerous applications to enhance traffic safety, traffic efficiency, and driving experience. However, VANETs also impose severe security and privacy challenges which need to be thoroughly investigated. In this dissertation, we enhance the security, privacy, and applications of VANETs, by 1) designing application-driven security and privacy solutions for VANETs, and 2) designing appealing VANET applications with proper security and privacy assurance. First, the security and privacy challenges of VANETs with most application significance are identified and thoroughly investigated. With both theoretical novelty and realistic considerations, these security and privacy schemes are especially appealing to VANETs. Specifically, multi-hop communications in VANETs suffer from packet dropping, packet tampering, and communication failures which have not been satisfyingly tackled in literature. Thus, a lightweight reliable and faithful data packet relaying framework (LEAPER) is proposed to ensure reliable and trustworthy multi-hop communications by enhancing the cooperation of neighboring nodes. Message verification, including both content and signature verification, generally is computation-extensive and incurs severe scalability issues to each node. The resource-aware message verification (RAMV) scheme is proposed to ensure resource-aware, secure, and application-friendly message verification in VANETs. On the other hand, to make VANETs acceptable to the privacy-sensitive users, the identity and location privacy of each node should be properly protected. To this end, a joint privacy and reputation assurance (JPRA) scheme is proposed to synergistically support privacy protection and reputation management by reconciling their inherent conflicting requirements. Besides, the privacy implications of short-time certificates are thoroughly investigated in a short-time certificates-based privacy protection (STCP2) scheme, to make privacy protection in VANETs feasible with short-time certificates. Secondly, three novel solutions, namely VANET-based ambient ad dissemination (VAAD), general-purpose automatic survey (GPAS), and VehicleView, are proposed to support the appealing value-added applications based on VANETs. These solutions all follow practical application models, and an incentive-centered architecture is proposed for each solution to balance the conflicting requirements of the involved entities. Besides, the critical security and privacy challenges of these applications are investigated and addressed with novel solutions. Thus, with proper security and privacy assurance, these solutions show great application significance and economic potentials to VANETs. Thus, by enhancing the security, privacy, and applications of VANETs, this dissertation fills the gap between the existing theoretic research and the realistic implementation of VANETs, facilitating the realistic deployment of VANETs.
Resumo:
The purpose of this policy is to facilitate the flow of information between the South Carolina Department of Public Safety, the news media and the general public, while protecting the rights of both the defendants and the prosecuting authorities in pending cases from exposure to prejudicial publicity. The DPS is committed to and recognizes the right of the general public and the news media to be fully and accurately informed about all matters of public interest regarding DPS. This policy will assure that the release of information meets the needs of the general public and news media without infringing on an individual’s right to privacy or interfering with the process of conducting a fair and impartial trial.
Resumo:
Current regulatory requirements on data privacy make it increasingly important for enterprises to be able to verify and audit their compliance with their privacy policies. Traditionally, a privacy policy is written in a natural language. Such policies inherit the potential ambiguity, inconsistency and mis-interpretation of natural text. Hence, formal languages are emerging to allow a precise specification of enforceable privacy policies that can be verified. The EP3P language is one such formal language. An EP3P privacy policy of an enterprise consists of many rules. Given the semantics of the language, there may exist some rules in the ruleset which can never be used, these rules are referred to as redundant rules. Redundancies adversely affect privacy policies in several ways. Firstly, redundant rules reduce the efficiency of operations on privacy policies. Secondly, they may misdirect the policy auditor when determining the outcome of a policy. Therefore, in order to address these deficiencies it is important to identify and resolve redundancies. This thesis introduces the concept of minimal privacy policy - a policy that is free of redundancy. The essential component for maintaining the minimality of privacy policies is to determine the effects of the rules on each other. Hence, redundancy detection and resolution frameworks are proposed. Pair-wise redundancy detection is the central concept in these frameworks and it suggests a pair-wise comparison of the rules in order to detect redundancies. In addition, the thesis introduces a policy management tool that assists policy auditors in performing several operations on an EP3P privacy policy while maintaining its minimality. Formal results comparing alternative notions of redundancy, and how this would affect the tool, are also presented.
Resumo:
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that protects private data through the enforcement of licenses provided by consumers. Prior to supplying data, data owners are expected to construct a detailed license for the potential data users. A license specifies whom, under what conditions, may have what type of access to the protected data. The specification of a license by a data owner binds the enterprise data handling to the consumer’s privacy preferences. However, licenses are very detailed, may reveal the internal structure of the enterprise and need to be kept synchronous with the enterprise privacy policy. To deal with this, we employ the Platform for Privacy Preferences Language (P3P) to communicate enterprise privacy policies to consumers and enable them to easily construct data licenses. A P3P policy is more abstract than a license, allows data owners to specify the purposes for which data are being collected and directly reflects the privacy policy of an enterprise.
Resumo:
Social and psychological theories have provided a plethora of evidence showing that the physical difficulty to express appropriate social interactions between drivers expresses itself in aggression, selfish driving and anti-social behaviour. Therefore there is a need to improve interactions between drivers and allow clearer collective decision making between them. Personal characteristics and the driving situations play strong roles in driver’s aggression. Our approach is centered around the driving situation as opposed to focusing on personality characteristics. It examines aggression and manipulates contextual variables such as driver’s eye contact exchanges. This paper presents a new unobtrusive in-vehicle system that aims at communicating drivers’ intentions, elicit social responses and increasing mutual awareness. It uses eye gaze as a social cue to affect collective decision making with the view to contribute to safe driving. The authors used a driving simulator to design a case control experiment in which eye gaze movements are conveyed with an avatar. Participants were asked to drive through different types of intersections. An avatar representing the head of the other driver was displayed and driver behaviour was analysed. Significant eye gaze pattern difference where observed when an avatar was displayed. Drivers cautiously refer to the avatar when information is required on the intention of others (e.g. when they do not have the right of way). The majority of participants reported the perception of “being looked at”. The number of glances and time spent gazing at the avatar did not indicate an unsafe distraction by standards of in-vehicle device ergonomic design. Avatars were visually consulted primarily in less demanding driving situations, which underlines their non-distractive nature.
Resumo:
The law recognises the right of a competent adult to refuse medical treatment even if this will lead to death. Guardianship and other legislation also facilitates the making of decisions to withhold or withdraw life-sustaining treatment in certain circumstances. Despite this apparent endorsement that such decisions can be lawful, doubts have been raised in Queensland about whether decisions to withhold or withdraw life-sustaining treatment would contravene the criminal law, and particularly the duty imposed by the Criminal Code (Qld) to provide the “necessaries of life”. This article considers this tension in the law and examines various arguments that might allow for such decisions to be made lawfully. It ultimately concludes, however, that criminal responsibility may still arise and so reform is needed.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.
Resumo:
Published in concomitance with the adoption of the United Nations Declaration on the Rights of Indigenous Peoples, this volume brings together a group of renowned legal experts and activists from different parts of the world who, from international and comparative perspectives, investigate the right of indigenous peoples to reparation for breaches of their individual and collective rights. The first part of the book is devoted to general aspects of this important matter, providing a comprehensive assessment of the relevant international legal framework and including overviews of the topic of reparations for human rights violations, the status of indigenous peoples in international law, and the vision of reparations as conceived by the communities concerned. The second part embraces a comprehensive investigation of the relevant practice at the international, regional, and national level, examining the best practices of reparations according to the ideologies and expectations of indigenous peoples and offering a comparative perspective on the ways in which the right of these peoples to redress for the injuries suffered is realized worldwide. The global picture painted by these contributions provides a view of the status of relevant international law that is synthesized in the two final chapters of the book, which include a concrete example of how a judicial claim for reparation is to be structured and prescribes the best practices and strategies to be adopted in order to maximize the opportunities for indigenous peoples to obtain effective redress. As a whole, this volume offers a comprehensive vision of its subject matter in international and comparative law, with a practical approach aimed at supporting legal academics, administrators, and practitioners in improving the avenues and modalities of reparations for indigenous peoples
Resumo:
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.
Resumo:
Traffic conflicts at railway junctions are very conmon, particularly on congested rail lines. While safe passage through the junction is well maintained by the signalling and interlocking systems, minimising the delays imposed on the trains by assigning the right-of-way sequence sensibly is a bonus to the quality of service. A deterministic method has been adopted to resolve the conflict, with the objective of minimising the total weighted delay. However, the computational demand remains significant. The applications of different heuristic methods to tackle this problem are reviewed and explored, elaborating their feasibility in various aspects and comparing their relative merits for further studies. As most heuristic methods do not guarantee a global optimum, this study focuses on the trade-off between computation time and optimality of the resolution.
Resumo:
Conflict occurs when two or more trains approach the same junction within a specified time. Such conflicts result in delays. Current practices to assign the right of way at junctions achieve orderly and safe passage of the trains, but do not attempt to reduce the delays. A traffic controller developed in the paper assigns right of way to impose minimum total weighted delay on the trains. The traffic flow model and the optimisation technique used in this controller are described. Simulation studies of the performance of the controller are given.