967 resultados para Offenses against property


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chlamydia pneumoniae is responsible for up to 20% of community acquired pneumonia and can exacerbate chronic inflammatory diseases. As the majority of infections are either mild or asymptomatic, a vaccine is recognized to have the greatest potential to reduce infection and disease prevalence. Using the C. muridarum mouse model of infection, we immunized animals via the intranasal (IN), sublingual (SL) or transcutaneous (TC) routes, with recombinant chlamydial major outer membrane protein (MOMP) combined with adjuvants CTA1-DD or a combination of cholera toxin/CpG-oligodeoxynucleotide (CT/CpG). Vaccinated animals were challenged IN with C. muridarum and protection against infection and pathology was assessed. SL and TC immunization with MOMP and CT/CpG was the most protective, significantly reducing chlamydial burden in the lungs and preventing weight loss, which was similar to the protection induced by a previous live infection. Unlike a previous infection however, these vaccinations also provided almost complete protection against fibrotic scarring in the lungs. Protection against infection was associated with antigen-specific production of IFNγ, TNFα and IL-17 by splenocytes, however, protection against both infection and pathology required the induction of a similar pro-inflammatory response in the respiratory tract draining lymph nodes. Interestingly, we also identified two contrasting vaccinations capable of preventing infection or pathology individually. Animals IN immunized with MOMP and either adjuvant were protected from infection, but not the pathology. Conversely, animals TC immunized with MOMP and CTA1-DD were protected from pathology, even though the chlamydial burden in this group was equivalent to the unimmunized controls. This suggests that the development of pathology following an IN infection of vaccinated animals was independent of bacterial load and may have been driven instead by the adaptive immune response generated following immunization. This identifies a disconnection between the control of infection and the development of pathology, which may influence the design of future vaccines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorists usually target high occupancy iconic and public buildings using vehicle borne incendiary devices in order to claim a maximum number of lives and cause extensive damage to public property. While initial casualties are due to direct shock by the explosion, collapse of structural elements may extensively increase the total figure. Most of these buildings have been or are built without consideration of their vulnerability to such events. Therefore, the vulnerability and residual capacity assessment of buildings to deliberately exploded bombs is important to provide mitigation strategies to protect the buildings' occupants and the property. Explosive loads and their effects on a building have therefore attracted significant attention in the recent past. Comprehensive and economical design strategies must be developed for future construction. This research investigates the response and damage of reinforced concrete (RC) framed buildings together with their load bearing key structural components to a near field blast event. Finite element method (FEM) based analysis was used to investigate the structural framing system and components for global stability, followed by a rigorous analysis of key structural components for damage evaluation using the codes SAP2000 and LS DYNA respectively. The research involved four important areas in structural engineering. They are blast load determination, numerical modelling with FEM techniques, material performance under high strain rate and non-linear dynamic structural analysis. The response and damage of a RC framed building for different blast load scenarios were investigated. The blast influence region for a two dimensional RC frame was investigated for different load conditions and identified the critical region for each loading case. Two types of design methods are recommended for RC columns to provide superior residual capacities. They are RC columns detailing with multi-layer steel reinforcement cages and a composite columns including a central structural steel core. These are to provide post blast gravity load resisting capacity compared to typical RC column against a catastrophic collapse. Overall, this research broadens the current knowledge of blast and residual capacity analysis of RC framed structures and recommends methods to evaluate and mitigate blast impact on key elements of multi-storey buildings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to explore the role of leadership in problem-oriented policing (POP). Design/methodology/approach – This paper uses interrupted time series models to isolate the impact on crime trends of a transformational leader's efforts to spearhead the implementation of a program of POP, called the problem solving model (PSM), in a southern state in Australia. Findings – This paper finds that the PSM led directly to an impact on overall crime, with a significant reduction in crimes per 100,000 persons per year after the introduction of the PSM. The majority of the overall crime drop attributable to implementation of POP was driven by reductions in property crime. It was noted that the leadership influence of the PSM was not effective in reducing all types of crime. Crimes against the person where not affected by the introduction of the PSM and public nuisance crimes largely followed the forecasted, upward trajectory. Practical implications – The driver behind the PSM was Commissioner Hyde and the success of the PSM is largely attributable to his strong commitment to transformational leadership and a top-down approach to implementation. These qualities encapsulate the original ideas behind POP that Goldstein (1979, 2003), back in 1979, highlighted as critical for the success of future POP programs. Social implications – Reducing crime is an important part of creating safe communities and improving quality of life for all citizens. This research shows that successful implementation of the PSM within South Australia under the strong leadership of Commissioner Hyde was a major factor in reducing property crime and overall crime rates. Originality/value – This paper is valuable because it demonstrates the link between strong leadership in policing, the commissioner's vision for POP and how his vision then translated into widespread adoption of POP. The study empirically shows that the statewide adoption of POP led to significant reductions in crime, particularly property crime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Boolean functions and their Möbius transforms are involved in logical calculation, digital communications, coding theory and modern cryptography. So far, little is known about the relations of Boolean functions and their Möbius transforms. This work is composed of three parts. In the first part, we present relations between a Boolean function and its Möbius transform so as to convert the truth table/algebraic normal form (ANF) to the ANF/truth table of a function in different conditions. In the second part, we focus on the special case when a Boolean function is identical to its Möbius transform. We call such functions coincident. In the third part, we generalize the concept of coincident functions and indicate that any Boolean function has the coincidence property even it is not coincident.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project was an initial stage in formulating and management of the optimum budget allocation during the operational, maintenance and rehabilitation phases in high rise residential property development in Malaysia. The principal objective of this project is to develop a framework of Whole Life Cycle Costing for high rise residential property development that will enhance the quality and cost effectiveness of this building type in Malaysia. The researcher investigated 13 building components from 6 high rise residential property developments in Johor, Malaysia to determine the affect and economic impact of component initial cost and quality by applying them to a Whole Life Cycle Cost model approach. The results provide valuable data in respect to the overall cost of specific components over the whole life of a large high rise building. In addition, Dr. Mat Noor also determined the impact and satisfaction of quality of building components through WLCC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The past decade has seen an increase in the number of significant natural disasters that have caused considerable loss of life as well as damage to all property markets in the affected areas. In many cases, these natural disasters have not only caused significant property damage, but in numerous cases, have resulted in the total destruction of the property in the location. With these disasters attracting considerable media attention, the public are more aware of where these affected property markets are, as well as the overall damage to properties that have been damaged or destroyed. This heightened level of awareness has to have an impact on the participants in the property market, whether a developer, vendor seller or investor. To assess this issue, a residential property market that has been affected by a significant natural disaster over the past 2 years has been analysed to determine the overall impact of the disaster on buyer, renter and vendor behaviour, as well as prices in these residential markets. This paper is based on data from the Brisbane flood in January 2011. This natural disaster resulted in loss of life and partial and total devastation of considerable residential property sectors. Data for the research have been based on the residential sales and rental listings for each week of the study period to determine the level of activity in the specific property sectors, and these are also compared to the median house prices for the various suburbs for the same period based on suburbs being either flood affected or flood free. As there are 48 suburbs included in the study, it has been possible to group these suburbs on a socio-economic basis to determine possible differences due to location and value. Data were accessed from realestate.com.au, a free real estate site that provides details of current rental and sales listings on a suburb basis, RP Data a commercial property sales database and the Australian Bureau of Statistics. The paper found that sales listings fell immediately after the flood in the affected areas, but there was no corresponding fall or increase in sales listings in the flood-free suburbs. There was a significant decrease in the number of rental listings follow the flood as affected parties sought alternate accommodation. The greatest fall in rental listings was in areas close to the flood-affected suburbs indicating the desire to be close to the flooded property during the repair period.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Streaming services like Spotify and Pandora pay many millions of dollars each year for the rights to the music they play. But how much of this ends up back with artists and songwriters? The answer: not an awful lot.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As in the first edition of the book, this chapter outlines the most important ways in which intellectual property is protected in Australia, and also the factors which affect the rights of joint venture participants in the absence of specific agreement between such participants. It then examines particular issues which may be considered in preparing appropriate documentation for any joint venture which involves the utilisation or generation of intellectual property to ensure that the joint venture participants achieve their desired result in terms of the allocation of ownership and control of such rights. The analysis includes and explanation of the special considerations which affect co-operation in research between industry and a university or government research institution. Finally, the rights of the joint venturers to intellectual property upon termination of the joint ventures are considered. The chapter incorporates the legislative changes and new cases in the field since the publication of the first edition.