922 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Following the collapse across the last decade of a number of large organizations such as Enron in the USA and several domestic organizations including Ansett Airlines, HIH Insurance and One.Tel, much discussion has ensued about the need to secure employee entitlements. However, tangible improvements in this area are elusive. Good corporate governance policies would suggest that deferred obligations as well as current debts should not be neglected and that appropriate arrangements be put in place to adequately fund employee entitlements. In this paper we consider recent Australian attempts to introduce better governance of employee entitlements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a feminist reflexive approach this paper reports on interviews with single mother’s in the Brisbane area about their experiences with food shopping and household food security. Preliminary findings suggest that most experience significant stress around the amount of money they have available for food. As the price of food and other costs of living increase, the only budget item that is flexible – groceries - is squeezed tighter. All women expressed a reluctance to ask for help from strangers at agencies instead relying on the support of family and friends to keep them food secure. Sometimes family and friends had no spare resources to help or were not aware of the extent their friend or relative might be struggling. The increased risks of poverty and food insecurity mean many go without as feeding the children takes precedence. The quality of their diets is variable with many reporting on aiming for quantity rather than being concerned with nutritional balance. Exhaustion and stress from being over-committed doing three roles, mother, father and housekeeper was self-identified as a key factor leading to mental health conditions such as depression, burnout and break down. Female single parent households are vulnerable to reducing welfare benefits as children grow or child support changes. Current policy forces single parents out to work but many can only manage part-time work for lower wages and are barely able to cope with this extra burden often resenting the reduction in benefits it brings. Public perceptions, derision and the notions of choice surrounding single parenting leave the cohort divided and silent for fear of reprisals. In my investigation issues arise about welfare policy that keep benefits low and workplace patriarchal power that can contribute to systemic poverty and the widening of the gender gap in poverty. So far analysis suggests a better support system around community food security including some hands on home help services, nutritional information, cooking classes, community gardening and other social capital building activities are needed for these women in order to avoid long-term health problems and help them better care for the next generation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Accessibility to housing for low to moderate income groups in Australia has been experiencing a severe decline since 2001. On the supply side, the public sector has been reducing its commitment to the direct provision of public housing. Despite high demand for affordable housing, there has been limited supply generated by non-government housing providers. One possible solution to promote an increase in affordable housing supply, like other infrastructure, is through the development of multi-stakeholder partnerships and private financing. This research aims to identify current issues underlying decision-making criteria for building multi-stakeholder partnerships to deliver affordable housing projects. It also investigates strategies for minimising risk and ensuring the financial outcomes of these partnership arrangements. A mix of qualitative in-depth interviews and quantitative surveys has been used as the main method to explore stakeholder experiences regarding their involvement in partnership arrangements in the affordable housing sector in Queensland. Two sets of interviews were conducted following an exploratory pilot study: one set in 2003-2004 and the other in 2007-2008. There were nineteen respondents representing government, private and not-for-profit organisations in the first stage interviews and surveys. The second stage interviews were focussed on twenty-two housing providers in South East Queensland. Initial analyses have been conducted using thematic and statistical analyses. This study extends the use of existing decision making tools and combines the use of a Soft System Framework to analyse the ideal state questionnaires using qualitative thematic analysis. Soft System Methodology (SSM) has been used to analyse this unstructured complex problem by using systematic thinking to develop a conceptual model and carrying it to the real world situations to solve the problem. This research found that the diversity of stakeholder capability and their level of risk acceptance will allow partnerships to develop the best synergies and a degree of collaboration which achieves the required financial return within acceptable risk parameters. However, some of the negativity attached to future commitment to such partnerships has been found to be the anticipation of a worse outcome than that expected from independent action. Many interviewees agree that housing providers' fear of financial risk and community rejection has been central to dampening their enthusiasm for entering such investment projects. The creation of a mixed-use development structure will mitigate both risk and return as the commercial income will subsidise the affordable housing development and will normalise concentration of marginalised low-income people who live in a prime location with an award winning design. In addition, tenant support schemes and rent-to-buy incentive programs will encourage them to secure their tenancies and significantly reduce the risk of rent arrears and property damage. There is also a breakthrough investment vehicle offered by the social developer which sells the non-physical but financial product to individual and institutional investors to mitigate further financial risk. Finally, this study recommends modification of the current value-for-money framework in favour of broader partnership arrangements which are more closely aligned with risk minimisation strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Natural disasters and deliberate, willful damage to telecommunication infrastructure can result in a loss of critical voice and data services. This loss of service hinders the ability for efficient emergency response and can cause delays leading to loss of life. Current mobile devices are generally tied to one network operator. When a disaster is of significant impact, that network operator cannot be relied upon to provide service and coverage levels that would normally exist. While some operators have agreements with other operators to share resources (such as network roaming) these agreements are contractual in nature and cannot be activated quickly in an emergency. This paper introduces Fourth Generation (4G) wireless networks. 4G networks are highly mobile and heterogeneous, which makes 4G networks highly resilient in times of disaster.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: As part of a comprehensive research study looking at implementing PPPs, interviews with experienced researchers were conducted to realize their views on private sector involvement in public works projects. Design / methodology / approach: Amongst these interviews, five were launched with academics from Hong Kong and Australia, and two were conducted with Legislative Councillors of the Hong Kong Special Administration Region (HKSAR) government. Findings: The interview findings show that both Hong Kong and Australian interviewees had previously conducted some kind of research in the field of PPP. The interviewees highlighted that “Different risk profiles” and “Private sector more innovative / efficient” were the main differences between projects that were procured by PPP and traditionally. Other differences include risk transfer. In a PPP arrangement the public sector passes on a substantial amount of the project risks to the private sector, whereas in a traditional case the public sector would take the largest responsibility in bearing these risks. Another common feature of the private sector is that they tend to be more efficient and innovative when compared to the public sector hence their expertise is often reflected in PPP projects. The interviewees agreed that the key performance indicators for PPP projects were unique depending on the individual project. The critical success factors mentioned by both groups of interviewees included “Transparent process”, “Project dependent” and “Market need”. Due to the fact that PPP projects tend to be large scaled costly projects, adequate transparency in the process is necessary in order to demonstrate that a fair selection and tendering process is conducted. A market need for the project is also important to ensure that the project will be financially secure and that the private sector can make a reasonable profit to cover their project expenditure. Originality / value: The findings from this study have enabled a comparative analysis between the views of researchers in two completely different jurisdictions. With the growing popularity to implement PPP projects, it is believed that the results presented in this paper would be of interest to the industry at large.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an Airborne Systems Laboratory for Automation Research. The Airborne Systems Laboratory (ASL) is a Cessna 172 aircraft that has been specially modified and equipped by ARCAA specifically for research in future aircraft automation technologies, including Unmanned Airborne Systems (UAS). This capability has been developed over a long period of time, initially through the hire of aircraft, and finally through the purchase and modification of a dedicated flight-testing capability. The ASL has been equipped with a payload system that includes the provision of secure mounting, power, aircraft state data, flight management system and real-time subsystem. Finally, this system has been deployed in a cost effective platform allowing real-world flight-testing on a range of projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the results from a study of information behaviors in the context of people's everyday lives undertaken in order to develop an integrated model of information behavior (IB). 34 participants from across 6 countries maintained a daily information journal or diary – mainly through a secure web log – for two weeks, to an aggregate of 468 participant days over five months. The text-rich diary data was analyzed using a multi-method qualitative-quantitative analysis in the following order: Grounded Theory analysis with manual coding, automated concept analysis using thesaurus-based visualization, and finally a statistical analysis of the coding data. The findings indicate that people engage in several information behaviors simultaneously throughout their everyday lives (including home and work life) and that sense-making is entangled in all aspects of them. Participants engaged in many of the information behaviors in a parallel, distributed, and concurrent fashion: many information behaviors for one information problem, one information behavior across many information problems, and many information behaviors concurrently across many information problems. Findings indicate also that information avoidance – both active and passive avoidance – is a common phenomenon and that information organizing behaviors or the lack thereof caused the most problems for participants. An integrated model of information behaviors is presented based on the findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The management of congenital talipes equinovarus (TEV) has received much clinical and research attention within the disciplines of medicine and physiotherapy. However, few articles have been published about the role of the registered nurse in contributing to the optimum health and wellbeing of the child and family presenting for assessment and treatment of the condition. Much of the most intense treatment for TEV occurs in the first few weeks of the child’s life; a time of critical growth and development when the infant is both sensitive and vulnerable to the environment within which it is nurtured. This is also a crucial time for developing a secure attachment to the caregiver and nurses can assist parents in optimising their infant’s opportunities for a secure attachment relationship. This paper thus provides an overview of the medical and physiotherapy management of TEV and highlights the role nurses have in providing nursing care and psycho-social support to parents of infants with TEV, in areas such as the maintenance of skin integrity and circulation, providing effective pain relief, and optimising growth, development, and a secure attachment relationship. Congenital TEV or 'club foot' is one of the most common congenital orthopaedic anomalies of infants. In Queensland in 2000, in approximately 50,000 births, 244 infants were born with talipes; almost five infants per 1000 births. National statistics are not as specific, with coding providing only 'other lower limb' as the category that would encompass talipes; the 1997 national incidence of such lower limb congenital malformations is reported as 1.7 per 10,000 births 1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At the turn of the millennium, the Earth’s human population has reached unprecedented levels and its natural resources are being pushed to the limit. Thus, cities are focused on sustainable development and they have begun to develop new strategies for improving the built environment. Sustainable development provides the best outcomes for the human and natural environments by improving the quality of life that protects and balances the ecological, social and economic values. This brings us to the main point: to build a sustainable built environment, cities need to redesign many of their technologies and planning policies within the context of ecological principles. As an environmental sustainability index model, ASSURE is developed to investigate the present environmental situation of an urban area by assessing the impacts of development pressure on natural resources. It is an innovative approach to provide the resilience and function of urban ecosystems secure against the environmental degradation for now and the future. This paper aims to underline the importance of the model (ASSURE) in preserving biodiversity and natural ecosystems in the built environment and investigate its role in delivering long-term urban planning policies.