922 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Queensland University of Technology (QUT) is faced with a rapidly growing research agenda built upon a strategic research capacity-building program. This presentation will outline the results of a project that has recently investigated QUT’s research support requirements and which has developed a model for the support of eResearch across the university. QUT’s research building strategy has produced growth at the faculty level and within its research institutes. This increased research activity is pushing the need for university-wide eResearch platforms capable of providing infrastructure and support in areas such as collaboration, data, networking, authentication and authorisation, workflows and the grid. One of the driving forces behind the investigation is data-centric nature of modern research. It is now critical that researchers have access to supported infrastructure that allows the collection, analysis, aggregation and sharing of large data volumes for exploration and mining in order to gain new insights and to generate new knowledge. However, recent surveys into current research data management practices by the Australian Partnership for Sustainable Repositories (APSR) and by QUT itself, has revealed serious shortcomings in areas such as research data management, especially its long term maintenance for reuse and authoritative evidence of research findings. While these internal university pressures are building, at the same time there are external pressures that are magnifying them. For example, recent compliance guidelines from bodies such as the ARC, and NHMRC and Universities Australia indicate that institutions need to provide facilities for the safe and secure storage of research data along with a surrounding set of policies, on its retention, ownership and accessibility. The newly formed Australian National Data Service (ANDS) is developing strategies and guidelines for research data management and research institutions are a central focus, responsible for managing and storing institutional data on platforms that can be federated nationally and internationally for wider use. For some time QUT has recognised the importance of eResearch and has been active in a number of related areas: ePrints to digitally publish research papers, grid computing portals and workflows, institutional-wide provisioning and authentication systems, and legal protocols for copyright management. QUT also has two widely recognised centres focused on fundamental research into eResearch itself: The OAK LAW project (Open Access to Knowledge) which focuses upon legal issues relating eResearch and the Microsoft QUT eResearch Centre whose goal is to accelerate scientific research discovery, through new smart software. In order to better harness all of these resources and improve research outcomes, the university recently established a project to investigate how it might better organise the support of eResearch. This presentation will outline the project outcomes, which include a flexible and sustainable eResearch support service model addressing short and longer term research needs, identification of resource requirements required to establish and sustain the service, and the development of research data management policies and implementation plans.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

China’s accession to the World Trade Organisation (WTO) has greatly enhanced global interest in investment in the Chinese media market, where demand for digital content is growing rapidly. The East Asian region is positioned as a growth area in many forms of digital content and digital service industries. China is attempting to catch up and take its place as a production centre to offset challenges from neighbouring countries. Meanwhile, Taiwan is seeking to use China both as an export market and as a production site for its digital content. This research investigates entry strategies of Taiwanese digital content firms into the Chinese market. By examining the strategies of a sample of Taiwan-based companies, this study also explores the evolution of their market strategies. However, the focus is on how distinctive business practices such as guanxi are important to Taiwanese business and to relations with Mainland China. This research examines how entrepreneurs manage the characteristics of digital content products and in turn how digital content entrepreneurs adapt to changing market circumstances. This project selected five Taiwan-based digital content companies that have business operations in China: Wang Film, Artkey, CnYES, Somode and iPartment. The study involved a field trip, undertaken between November 2006 and March 2007 to Shanghai and Taiwan to conduct interviews and to gather documentation and archival reports. Six senior managers and nine experts were interviewed. Data were analysed according to Miller’s firm-level entrepreneurship theory, foreign direct investment theory, Life Cycle Model and guanxi philosophy. Most studies of SMEs have focused on free market (capitalist) environments. In contrast, this thesis examines how Taiwanese digital content firms’ strategies apply in the Chinese market. I identified three main types of business strategy: cost-reduction, innovation and quality-enhancement; and four categories of functional strategies: product, marketing, resource acquisition and organizational restructuring. In this study, I introduce the concept of ‘entrepreneurial guanxi’, special relationships that imply mutual obligation, assurance and understanding to secure and exchange favors in entrepreneurial activities. While guanxi is a feature of many studies of business in Pan-Chinese society, it plays an important mediating role in digital content industries. In this thesis, I integrate the ‘Life Cycle Model’ with the dynamic concept of strategy. I outline the significant differences in the evolution of strategy between two types of digital content companies: off-line firms (Wang Film and Artkey) and web-based firms (CnYES, Somode and iPartment). Off-line digital content firms tended to adopt ‘resource acquisition strategies’ in their initial stages and ‘marketing strategies’ in second and subsequent stages. In contrast, web-based digital content companies mainly adopted product and marketing strategies in the early stages, and would adopt innovative approaches towards product and marketing strategies in the whole process of their business development. Some web-based digital content companies also adopted organizational restructuring strategies in the final stage. Finally, I propose the ‘Taxonomy Matrix of Entrepreneurial Strategies’ to emphasise the two dimensions of this matrix: innovation, and the firm’s resource acquisition for entrepreneurial strategy. This matrix is divided into four cells: Effective, Bounded, Conservative, and Impoverished.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Family businesses dominate in a majority of economies (Astrachan and Shanker, 2003; Chrisman, Chua, and Sharma, 2005; Morck and Yeung, 2004). As entrepreneurial activities have been shown to be central to economic growth it is essential that family businesses, irrespective of ownership patterns, not only survive but also grow thus growing the economy overall. While a great deal is known about entrepreneurial activities and a body of knowledge is being developed in relation to entrepreneurial processes in family firms, more needs to be understood in relation to the dynamics of entrepreneurial activities at the individual family firm level. One area of particular interest is the dynamics within the business and the family and how these dynamics impact upon entrepreneurial activities. Specifically how relationships between and among family members engaged in the business can interact with professional non-family member senior executives. The senior executives can actively use their positions in such ways that initiatives suggested by family members are less successful than they might be. This paper addresses how ‘family’ aspects of a business can assist or impede the entrepreneurial activities of individuals. It takes into account some of the unique features of family businesses – such as the importance of ‘familiness’ as a competitive advantage; the direct links between ownership and control of a business and the recognition (often implicit) that individuals in families do make a difference to how the business functions (Habbershon and Williams, 1999, Sharma, 2004; and Tokarczyk, Hansen Green, and Down, 2007). This emphasis on individuals in families fits well with the idea of entrepreneur as individual, as expressed by Schumpeter (1934), Baumol et al (2007). The theoretical approach that adopted to explore the dynamics of processes occurring within family firms is structuration theory combined with a theory of embeddeness (Dacin, Ventresca and Beal, 1999; Giddens, 1979, 1984, Jack and Anderson, 2002; and Sarason, Dean and Dillard, 2006).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Homophobic hatred: these words summarise online commentary made by people in support of a school that banned gay students from taking their same sex partners to a school formal. With the growing popularity of online news sites, it seems appropriate to critically examine how these sites are becoming a new arena in which people can express personal opinions about controversial topics. While commentators equally expressed two dominant viewpoints about the school ban (homophobic hatred and human rights), this paper focuses on homophobic hatred as a discursive position and how the comments work to confirm the legitimacy of the schools’ decision. Drawing on the work of Foucault and others, the paper examines how the comments constitute certain types of subjectivity drawing on dominant ideas about what it means to be homophobic. The analysis demonstrates the complex and competing skein of strategies that constitute queering school social spaces as a social problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives This research explores the relationship between young firms, their growth orientation-intention and a range of relationships which can be seen to provide business support. Prior-work Research indicates that networks impact the firm’s ability to secure resources (Sirmon and Hitt 2003; Liao and Welsch. 2004; Hanlon and Saunders 2007). Networks have been evaluated in a number of ways ranging from simple counts to characteristics of their composition (Davidsson and Honig 2003), strength of relationships (Granovetter 1973) and network diversity (Carter et al 2003). By providing access to resources and knowledge (from start-up assistance and raising capital, (e.g. Smallbone et al, 2003), networks may assist in enabling continued persistence during those times where firms may experience resource constraints owing to firm growth (Baker and Nelson 2005). Approach The data used in this research was generated in the 2008 UK Federation of Small Businesses (FSB) survey. Over 1,000 of the firms responding were found to fall into the category of “young”, ((defined as firms under 4 years old). Firms were considered the unit of analysis with the entrepreneur being the chief spokesperson for the firm. Preliminary data analysis considered key demographic characteristics and industry classifications, comparing the FSB data with that of the UK government’s own (BERR) Small Business Surveys of 2007 and 2008, to establish some degree of representativeness of the respondents. The analysis then examined networks with varying potential ability to provide support for young firms, the networks measured in terms of number, diversity, characteristic and strength in its relationship to young firm growth orientation. The diversity of business-support-related relationships ranged from friends and family, through professional services, customers and suppliers, and government business services, to trade associations and informal business networks. The characteristics of these formal and informal sources of support for new businesses are examined across a range of business support-type activities for new firms. The number of relationships and types of business support are also explored. Finally, the strength of these relationships is examined by analysis of the source of business support, type of business support, and links to the growth orientation-intention of the firm, after controlling for a number of key variables related to firm and industry status and owner characteristics. Results Preliminary analysis of the data by means of univariate analysis showed that average number of sources of advice was around 2.5 (from a potential total of 6). In terms of the diversity of relationships, universities had by far the smallest percentage of firms receiving beneficial advice from them. Government business services were beneficially used by 40% of young firms, the other relationship types being around the 50-55% mark. In terms of characteristics of the advice, the average number of areas in which benefit was achieved was around 5.5 of a maximum of 15. Start-up advice has by far the highest percentage of firms obtaining beneficial advice, with increasing sales, improving contacts and improving confidence being the other categories at or around the 50% mark. Other market-focused areas where benefits were also received were in the areas of new markets, existing product improvements and new product improvements, where around 40% of the young responding firms obtained benefit. Regression techniques evaluating the strength of these relationships in terms of the links between business support (by source of support, type of support, and range of support) and firm growth orientation-intention focus highlighted a number of significant relationships, even after controlling for a range of other explanatory variables identified in the literature. Specifically, there was found to be a positive relationship between receiving business advice generally (regardless of type or source) and growth orientation. This relationship was seen to be stronger, however, when looking at the number of types of beneficial advice received, and stronger again for the number of sources of this advice. In terms of individual sources of advice, customers and suppliers had the strongest relationship with growth, with Government business services also found to be significant. Combining these two sources was also seen to increase the strength of the relationship between these two sources of advice and growth orientation. In considering areas of support, growth was most strongly positively related to advice that benefited the development of new products and services, and also business confidence, but was negatively related to advice linked to business recovery. Finally, amalgamating the 4 key types and sources of advice to examine the impact of combinations of these types and sources of advice also improved the strength of the relationship. Implications The findings will assist in the understanding of young firms in general and growth more specifically, particularly the role and importance of specific sources, types and combinations of business support used more extensively by new young growth-oriented firms. Value This research may assist in processes designed to allow entrepreneurs to make better decisions; educators and support organizations to develop better advice and assistance, and Governments design better conditions for the creation of new growth-oriented businesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Privacy enhancing protocols (PEPs) are a family of protocols that allow secure exchange and management of sensitive user information. They are important in preserving users’ privacy in today’s open environment. Proof of the correctness of PEPs is necessary before they can be deployed. However, the traditional provable security approach, though well established for verifying cryptographic primitives, is not applicable to PEPs. We apply the formal method of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various security properties of PIEMCP using state space analysis techniques. This investigation provides us with preliminary insights for modeling and verification of PEPs in general, demonstrating the benefit of applying the CPN-based formal approach to proving the correctness of PEPs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other's identity without directly disclosing private information to the other party. Multi-factor authentication can provide an enhanced level of assurance in higher-security scenarios such as online banking, virtual private network access, and physical access because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised. We introduce a security model for multi-factor password-authenticated key exchange protocols, propose an efficient and secure protocol called MFPAK, and provide a security argument to show that our protocol is secure in this model. Our security model is an extension of the Bellare-Pointcheval-Rogaway security model for password-authenticated key exchange and accommodates an arbitrary number of symmetric and asymmetric authentication factors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Demand of low cost housing increased from 1995 to 1997 which is shown by the number of housing loan approval. In order to develop the most suitable marketing plan, developer needs to know some factors which influenced to the decision making process of buying house. This research used a residential development in PT Delta Comoro Permai, Dilly as a case study. A survey to homeowners has been done to evaluate the motivation and perception factors in buying home behaviour. The survey has been done on the 3rd August to 29th August 1998. In this study, four main components have been examined. Physical and linkage are not as important as environment and utilities for the homebuyer. Moreover, the result is consistent with developer’s motto ‘clean, secure, aesthetic, healthy and prosperity’. This study provides further recommendation in the environment and utilities components for the new development in the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Against a background of population aging, and with it, warnings about the sustainability of social welfare systems and problems associated with declining labour supply, there is an increasing policy emphasis on extending working lives of older workers among the industrialised nations (Hirsch, 2003; Keese, 2005; Taylor, 2006). However, recent commentaries have tended to focus on the relationship between population aging and the labour market, largely ignoring other critical factors that are affecting older workers’ relationship with the labour market. This contrasts with extensive research undertaken in the 1980s and 1990s when the forces acting upon older workers at that time were thoroughly elucidated (e.g. Kohli et al., 1991). The focus of this paper is on the labour supply challenges for employers and nations arising from demographic trends, in combination with social and technological changes and the wider forces of globalisation, how each is responding, and how these trends are affecting older workers’ trying to secure or maintain footholds in a labour market but facing, as Richard Sennett (2006) puts it, the ‘spectre of uselessness’ as jobs they could do have either migrated to other parts of the world or have been destroyed in the wake of industry failure.