963 resultados para Security token service
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
As network capacity has increased over the past decade, individuals and organisations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the direct control of the individual or organisation that provided the data, leaving data owners at risk of data theft or misuse. This paper describes a model by which data owners can control the distribution and use of their data throughout a dynamic coalition of service providers using digital rights management technology. Our model allows a data owner to establish the trustworthiness of every member of a coalition employed to process data, and to communicate a machine-enforceable usage policy to every such member.
Resumo:
This paper looks at the decision-making process that determines the amount of effort frontline service employees will expend in delivering a service in a business-to-business context. Using theories in behavioural economics and interactional and social psychology, the paper develops and presents a model of employee decision-making. Managerial implications, which have the potential to enhance the marketing of business-to-business services and directions for future research in this area, are indicated.
Resumo:
Web service composition is an important problem in web service based systems. It is about how to build a new value-added web service using existing web services. A web service may have many implementations, all of which have the same functionality, but may have different QoS values. Thus, a significant research problem in web service composition is how to select a web service implementation for each of the web services such that the composite web service gives the best overall performance. This is so-called optimal web service selection problem. There may be mutual constraints between some web service implementations. Sometimes when an implementation is selected for one web service, a particular implementation for another web service must be selected. This is so called dependency constraint. Sometimes when an implementation for one web service is selected, a set of implementations for another web service must be excluded in the web service composition. This is so called conflict constraint. Thus, the optimal web service selection is a typical constrained ombinatorial optimization problem from the computational point of view. This paper proposes a new hybrid genetic algorithm for the optimal web service selection problem. The hybrid genetic algorithm has been implemented and evaluated. The evaluation results have shown that the hybrid genetic algorithm outperforms other two existing genetic algorithms when the number of web services and the number of constraints are large.
Resumo:
In an age where financial transactions are conducted worldwide and mobility of citizens throughout the world is common, lawyers seeking to serve Bankruptcy Notices and Creditor’s Petitions encounter many problems. To assist lawyers in overcoming some of the service problems that are arising as a result of this changing world, a number of recent cases are considered that highlight a number of issues, including American Express Australia Limited v Michaels [2010] FMCA 103, Deputy Commissioner of Taxation v Barnes (2008) 70 ATR 776; [2008] FMCA 7, Battenberg v Restom & Ors (2005) 223 ALR 692; upheld by the Full Federal Court in Battenberg v Restrom and Ors (2006) 149 FCR 128 at 133; [2006] FCAFC 20 and Envee Energy Pty Ltd (In Liquidation) v Stockford [2007] FMCA 1426. While the fact situation of every bankruptcy case will differ, recent decisions may assist lawyers in dealing effectively with bankruptcy matters in these times of transition. Lawyers can facilitate completion of the litigious process within the relevant legislative framework in order to satisfy their responsibility to clients and to the Court by considering this case law.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
Managing service quality is of primary importance for organizations that are increasingly service oriented, and offering a growing range of services to external and internal customers. Managing service quality requires the capacity to measure service quality, concomitantly requiring explicit conceptions of ‘service’ and ‘service quality’. This white-paper explores three keys areas of service and service marketing literature: service definition and conceptualisation, service classifications, and service quality models, and make the following observations and proposals.
Resumo:
This study examined pre-service teachers’ efficacy in relation to the utilisation of microteaching as an assessment tool for postgraduate education students in Australia. Three hundred and fifteen pre-service teachers completed the teacher efficacy survey and additional qualitative questions at Time 1 and 208 completed the survey and questions at Time 2. A principal components analysis conducted on the Time 1 survey data revealed teacher efficacy to be comprised of two components: ‘teacher efficacy in classroom management’ and ‘personal teacher efficacy’. Repeated measures ANOVAs conducted on the 208 participants who completed the survey at Time 1 and 2 revealed that efficacy on both components increased significantly over time, and that internet students had higher efficacy levels than internal students. The qualitative data revealed that pre-service teachers enter teaching in order to positively impact on children, yet are concerned about behaviour management in the classroom. In addition, this data highlighted the positive impact that microteaching had on their developing teacher identity.
Resumo:
The phenomenon of organizations offering service bundles can typically be observed in dynamic markets with heterogeneous customer demand. Available literature broaching the issue of service bundling covers strategic considerations for organizations related to their respective market position as well as their pricing options for different bundle configurations. However, little guidance can be found regarding the identification of potential bundle candidates and the actual process of bundling. In this paper, we present an approach to service bundling that can be utilized by organizations to identify services that are suitable for bundling. The contribution of the paper is twofold. Firstly, the proposed method represents a structured conceptualization approach for organizations to facilitate the creation of bundles in practice based on empirical findings. Secondly, from a Design Science research perspective, the proposed method represents an innovative artifact that extends the academic knowledge base related to service management.
Resumo:
GMPLS is a generalized form of MPLS (MultiProtocol Label Switching). MPLS is IP packet based and it uses MPLS-TE for Packet Traffic Engineering. GMPLS is extension to MPLS capabilities. It provides separation between transmission, control and management plane and network management. Control plane allows various applications like traffic engineering, service provisioning, and differentiated services. GMPLS control plane architecture includes signaling (RSVP-TE, CR-LDP) and routing (OSPF-TE, ISIS-TE) protocols. This paper provides an overview of the signaling protocols, describes their main functionalities, and provides a general evaluation of both the protocols.
Resumo:
The communities located adjacent to and around the Airport City are composed of diverse interests and cultures that often have little to do with the airport and its global service functions. Yet, as most airport managers know, these communities can have a significant impact on airport operations and land use. Community engagement is an essential element to airport planning and management that is often underplayed and given only a token effort. In order for Airport Cities to realize their full potential in global and national markets as well as assume an appropriate level of corporate responsibility there needs to be a strong and enduring connections to local and regional communities. Through a series of nationally held workshops throughout Australia and internationally, we have reviewed the complex relationship between airports and their surrounding communities. We argue the following engagement elements improve both communication and relationships with local communities and must be actively nurtured, developed and pursued by airport managers: connectivity, collaboration and citizenry.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
Resumo:
This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.
Resumo:
Radio Program. Talkin with Tiga Bayles, 98.9 AM National Indigenous Radio Service (NIRS), 9.00-10.00am, Wednesday 21 July 2010. (1 hour program).----- Bronwyn Fredericks discssed the National Aboriginal and Torres Strait Islander Women’s Health Strategy was launched at the Australian Women’s Health Network (AWHN) National Conference in Hobart on the 19 May 2010. Within this radio interview the background of the Strategy is discussed, funding, who did the consultations and the writing. In the interview Bronwyn Fredericks outlines the process of the Strategy’s development and its uses for the future.----- It is important to note that this Strategy does not replace other national or State and Territory documents which identify priorities and needs. The aim is to supplement existing work.