922 resultados para secure interoperation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between radiologic union and clinical outcomes in thoracoscopic scoliosis surgery is not clear, as apparent non-union of a spinal fusion does not always correspond to a poor clinical result. The aim of this study was to evaluate for the first time the interbody fusion rates using low dose CT scans at minimum 24 months after thoracoscopic scoliosis surgery, and to explore the relationship between fusion scores and; (i) rod diameter, (ii) graft type, (iii) fusion level, (iv) implant failure, and (v) lateral position in the disc space. The study found that moderate fusion scores on the Sucato scale secure successful clinical outcomes in thoracoscopic scoliosis surgery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is little research on HRM practices in knowledge-intensive firms (KIFs), especially in comparison to that conducted in traditional production environments. Whether such HRM practices are appropriate for KIFs, particularly ones that differentiate themselves on their ability to innovate, is the basis of this research. The study investigates the HRM practices being used by four innovative firms: two KIFs and two traditional production companies. The findings suggest that there are some similarities between the HRM practices of the case firms, but there are also important differences. Specifically, the KIFs emphasise use of selection criteria and processes that secure a workforce with a desire for challenging work and the ability to work collaboratively. The KIFs are also more likely to provide a breadth of training and development opportunities for teams and individuals, to make extensive use of performance management systems, and to utilise a range of strategies to encourage and reward innovation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: This qualitative study aims to provide insight into how Australian New Graduate Nurses (NGNs) experienced their transition to acute care nursing practice. Method: Nine NGNs each participated in three in-depth interviews conducted across their first year of practice. Constant comparative analysis was used to identify the emergent themes. Findings: The desire to fit in (establishment of secure social bonds) with ward staff is an important element of NGN transition experiences. Fitting in was about feeling one's self to be part of a social group, and participants made it clear that their perceptions of their success in establishing secure and meaningful social bonds in each new ward was extremely important for their sense of being as NGNs. Current NGN Transition Programmes (NGNTPs) involve multiple ward rotations, increasing the demand for the NGN to fit in. Thus participants were engaged in a deeply personal transition experience that was not necessarily aligned with multiple ward rotations. Conclusions: Although NGNTPs have the word “transition” in their title, it may be that current programmes are more focussed on organisations’ desire to “orient” NGNs to working within the acute care setting than facilitating personal transitions to practice. Further investigation of the impact of NGNTPs on NGNs and the associated multiple ward rotations is required.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attachment difficulties have been proposed as a key risk factor for the development of alexithymia, a multifaceted personality trait characterised by difficulties identifying and describing feelings, a lack of imagination and an externally oriented thinking style. The present study investigated the relationship between attachment and alexithymia in an alcohol dependent population. Participants were 210 outpatients in a Cognitive Behavioural Treatment Program assessed on the Toronto Alexithymia Scale (TAS-20) and the Revised Adult Attachment Scale (RAAS). Significant relationships between anxious attachment and alexithymia factors were confirmed. Furthermore, alexithymic alcoholics reported significantly higher levels of anxious attachment and significantly lower levels of closeness (secure attachment) compared to non-alexithymic alcoholics. These findings highlight the importance of assessing and targeting anxious attachment among alexithymic alcoholics in order to improve alcohol treatment outcomes. Keywords: Attachment, alexithymia, alcohol dependence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between radiologic union and clinical outcome in thoracoscopic scoliosis surgery is not clear, as apparent non-union of a spinal fusion does not always correspond to a poor clinical result. The aim of this study was to evaluate CT fusion rates 2yrs after thoracoscopic surgery, and to explore the relationship between fusion scores and rod diameter, graft type, fusion level, implant failure, and lateral position in the disc space. This study suggests that moderate fusion scores secure successful clinical outcomes in thoracoscopic scoliosis surgery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Power system dynamic analysis and security assessment are becoming more significant today due to increases in size and complexity from restructuring, emerging new uncertainties, integration of renewable energy sources, distributed generation, and micro grids. Precise modelling of all contributed elements/devices, understanding interactions in detail, and observing hidden dynamics using existing analysis tools/theorems are difficult, and even impossible. In this chapter, the power system is considered as a continuum and the propagated electomechanical waves initiated by faults and other random events are studied to provide a new scheme for stability investigation of a large dimensional system. For this purpose, the measured electrical indices (such as rotor angle and bus voltage) following a fault in different points among the network are used, and the behaviour of the propagated waves through the lines, nodes, and buses is analyzed. The impact of weak transmission links on a progressive electromechanical wave using energy function concept is addressed. It is also emphasized that determining severity of a disturbance/contingency accurately, without considering the related electromechanical waves, hidden dynamics, and their properties is not secure enough. Considering these phenomena takes heavy and time consuming calculation, which is not suitable for online stability assessment problems. However, using a continuum model for a power system reduces the burden of complex calculations

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article investigates the complex phenomenon of major gift giving to charitable institutions. Drawing on empirical evidence from interviews with 16 Australian major donors (who gave a single gift of at least AU$10,000 in 2008 or 2009), we seek to better understand donor expectations and (dis)satisfaction. Given growing need for social services, and the competition among nonprofit organisations (NPOs) to secure sustainable funding, this research is particularly timely. Currently, little is known about major donors’ expectations, wants and needs. Equity theory, with the concept of reciprocity at its core, was found to provide a useful framework for understanding these phenomena. A model of equitable major gift relationships was developed from the data, which portrays balanced relationships and identifies potential areas of dissatisfaction for major donors. We conclude by offering suggestions for NPOs seeking to understand the complexities of major gift relationships, with practical implications for meeting donors’ needs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Book summary: In a constantly evolving context of performance management, accountability and risk assessment, police organisations and frontline police officers are required to pay careful attention to what has come to be known as ‘at risk people’, ‘vulnerable populations’ or ‘vulnerable people’. Vulnerable people have become a key focus of policy. Concurrently, there have been stronger demands on police, and a steep increase in police powers in relation to their interaction with vulnerable people. The premise of this protectionist and interventionist agenda is threefold: to protect the rights of vulnerable individuals proactively cater for their vulnerability within the justice system; and to secure police operations and protocols within strict guidelines. This collection unpacks ‘vulnerable people policing’ in theory and practice and guides the reader through the policing process as it is experienced by police officers, victims, offenders, witnesses and justice stakeholders. Each chapter features a single step of the policing process: from police recruit education through to custody, and the final transfer of vulnerable people to courts and sentencing. This edited collection provides analytical, theoretical and empirical insights on vulnerable people policing, and reflects on critical issues in a domain that is increasingly subject to speedy conversion from policy to practice, and heightened media and political scrutiny. It breaks down policing practices, operations and procedures that have vulnerable populations as a focus, bringing together original and innovative academic research and literature, practitioner experience and discussion of policy implications (from local and international perspectives). The particular nature of this collection highlights the multi-disciplinary nature of police work, sheds light on how specific, mandatory policies guide police officers steps in their interaction with vulnerable populations, and discusses the practicalities of police decision making at key points in this process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Having IT-related capabilities is not enough to secure value from the IT resources and survive in today’s competitive environment. IT resources evolve dynamically and organisations must sustain their existing capabilities to continue to leverage value from their IT resources. Organisations’ IT-related management capabilities are an important source of their competitive advantage. We suggest that organisations can sustain these capabilities through appropriate considerations of resources at the technology-use level. This study suggests that an appropriate organisational design relating to decision rights and work environment, and a congruent reward system can create a dynamic IT-usage environment. This environment will be a vital source of knowledge that could help organisations to sustain their IT-related management capabilities. Analysis of data collected from a field survey demonstrates that this dynamic IT-usage environment, a result of the synergy between complementary factors, helps organisations to sustain their IT-related management capabilities. This study adds an important dimension to understanding why some organisations continue to perform better with their IT resources than others. For practice, this study suggests that organisations need to consider a comprehensive approach to what constitutes their valuable resources.