954 resultados para security complex
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.
Resumo:
Increases in functionality, power and intelligence of modern engineered systems led to complex systems with a large number of interconnected dynamic subsystems. In such machines, faults in one subsystem can cascade and affect the behavior of numerous other subsystems. This complicates the traditional fault monitoring procedures because of the need to train models of the faults that the monitoring system needs to detect and recognize. Unavoidable design defects, quality variations and different usage patterns make it infeasible to foresee all possible faults, resulting in limited diagnostic coverage that can only deal with previously anticipated and modeled failures. This leads to missed detections and costly blind swapping of acceptable components because of one’s inability to accurately isolate the source of previously unseen anomalies. To circumvent these difficulties, a new paradigm for diagnostic systems is proposed and discussed in this paper. Its feasibility is demonstrated through application examples in automotive engine diagnostics.
Resumo:
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.
Resumo:
Instances of parallel ecotypic divergence where adaptation to similar conditions repeatedly cause similar phenotypic changes in closely related organisms are useful for studying the role of ecological selection in speciation. Here we used a combination of traditional and next generation genotyping techniques to test for the parallel divergence of plants from the Senecio lautus complex, a phenotypically variable groundsel that has adapted to disparate environments in the South Pacific. Phylogenetic analysis of a broad selection of Senecio species showed that members of the S. lautus complex form a distinct lineage that has diversified recently in Australasia. An inspection of thousands of polymorphisms in the genome of 27 natural populations from the S. lautus complex in Australia revealed a signal of strong genetic structure independent of habitat and phenotype. Additionally, genetic differentiation between populations was correlated with the geographical distance separating them, and the genetic diversity of populations strongly depended on geographical location. Importantly, coastal forms appeared in several independent phylogenetic clades, a pattern that is consistent with the parallel evolution of these forms. Analyses of the patterns of genomic differentiation between populations further revealed that adjacent populations displayed greater genomic heterogeneity than allopatric populations and are differentiated according to variation in soil composition. These results are consistent with a process of parallel ecotypic divergence in face of gene flow.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
Saccharification of sugarcane bagasse pretreated at the pilot-scale with different processes (in combination with steam-explosion) was evaluated. Maximum glucan conversion with Celluclast 1.5 L (15–25 FPU/g glucan) was in the following order: glycerol/HCl > HCl > H2SO4 > NaOH, with the glycerol system achieving ∼100% conversion. Surprisingly, the NaOH substrate achieved optimum saccharification with only 8 FPU/g glucan. Glucan conversions (3.6–6%) obtained with mixtures of endo-1,4-β-glucanase (EG) and β-glucosidase (βG) for the NaOH substrate were 2–6 times that of acid substrates. However, glucan conversions (15–60%) obtained with mixtures of cellobiohydrolase (CBH I) and βG on acidified glycerol substrate were 10–30% higher than those obtained for NaOH and acid substrates. The susceptibility of the substrates to enzymatic saccharification was explained by their physical and chemical attributes. Acidified glycerol pretreatment offers the opportunity to simplify the complexity of enzyme mixtures required for saccharification of lignocellulosics.
Resumo:
Bactrocera dorsalis (Hendel), Bactrocera papayae Drew & Hancock, Bactrocera philippinensis Drew & Hancock, and Bactrocera carambolae Drew & Hancock are pest members within the B. dorsalis species complex of tropical fruit flies. The species status of these taxa is unclear and this confounds quarantine, pest management, and general research. Mating studies carried out under uniform experimental conditions are required as part of resolving their species limits. These four taxa were collected from the wild and established as laboratory cultures for which we subsequently determined levels of prezygotic compatibility, assessed by field cage mating trials for all pair-wise combinations. We demonstrate random mating among all pair-wise combinations involving B. dorsalis, B. papayae, and B. philippinensis. B. carambolae was relatively incompatible with each of these species as evidenced by nonrandom mating for all crosses. Reasons for incompatibility involving B. carambolae remain unclear; however, we observed differences in the location of couples in the field cage for some comparisons. Alongside other factors such as pheromone composition or other courtship signals, this may lead to reduced interspecific mating compatibility with B. carambolae. These data add to evidence that B. dorsalis, B. papayae, and B. philippinensis represent the same biological species, while B. carambolae remains sufficiently different to maintain its current taxonomic identity. This poses significant implications for this group's systematics, impacting on pest management, and international trade.
Resumo:
Bactrocera dorsalis sensu stricto, B. papayae, B. philippinensis and B. carambolae are serious pest fruit fly species of the B. dorsalis complex that predominantly occur in south-east Asia and the Pacific. Identifying molecular diagnostics has proven problematic for these four taxa, a situation that cofounds biosecurity and quarantine efforts and which may be the result of at least some of these taxa representing the same biological species. We therefore conducted a phylogenetic study of these four species (and closely related outgroup taxa) based on the individuals collected from a wide geographic range; sequencing six loci (cox1, nad4-3′, CAD, period, ITS1, ITS2) for approximately 20 individuals from each of 16 sample sites. Data were analysed within maximum likelihood and Bayesian phylogenetic frameworks for individual loci and concatenated data sets for which we applied multiple monophyly and species delimitation tests. Species monophyly was measured by clade support, posterior probability or bootstrap resampling for Bayesian and likelihood analyses respectively, Rosenberg's reciprocal monophyly measure, P(AB), Rodrigo's (P(RD)) and the genealogical sorting index, gsi. We specifically tested whether there was phylogenetic support for the four 'ingroup' pest species using a data set of multiple individuals sampled from a number of populations. Based on our combined data set, Bactrocera carambolae emerges as a distinct monophyletic clade, whereas B. dorsalis s.s., B. papayae and B. philippinensis are unresolved. These data add to the growing body of evidence that B. dorsalis s.s., B. papayae and B. philippinensis are the same biological species, which poses consequences for quarantine, trade and pest management.
Resumo:
Problem: In response to an identified need, a specialist antenatal clinic for women from refugee backgrounds was introduced in 2008, with an evaluation planned and completed in 2010. Question: Can maternity care experiences for women from refugee backgrounds, attending a specialist antenatal clinic in a tertiary Australian public hospital, be improved? Methods: The evaluation employed mixed methods, generating qualitative and quantitative data from two hospital databases, a chart audit, surveys and interviews with service users, providers and stakeholders. Contributions were received from 202 participants. Findings: The clinic was highly regarded by all participants. Continuity of care throughout the antenatal period was particularly valued by newly arrived women as it afforded them security and support to negotiate an unfamiliar Western maternity system. Positive experiences decreased however; as women transitioned from the clinic to labour and postnatal wards where they reported that their traditional birthing and recuperative practices were often interrupted by the imposition of Western biomedical notions of appropriate care. The centrally located clinic was problematic, frequently requiring complex travel arrangements. Appointment schedules often impacted negatively on traditional spousal and family obligations. Conclusions: Providing comprehensive and culturally responsive maternity care for women from refugee backgrounds is achievable, however it is also resource intensive. The production of translated information which is high quality in terms of production and content, whilst also taking account of languages which are only rarely encountered, is problematic. Cultural competency programmes for staff, ideally online, require regular updating in light of new knowledge and changing political sensitivities.
Resumo:
The interaction between new two-dimensional carbon allotropes, i.e. graphyne (GP) and graphdiyne (GD), and light metal complex hydrides LiAlH4, LiBH4, and NaAlH4 was studied using density functional theory (DFT) incorporating long range van der Waals dispersion correction. The light metal complex hydrides show much stronger interaction with GP and GP than that with fullerene due to the well defined pore structure. Such strong interactions greatly affect the degree of charge donation from the alkali metal atom to AlH4 or BH4, consequently destabilizing the Al-H or B-H bonds. Compared to the isolated light metal complex hydride, the presence of GP or GD can lead to a significant reduction of the hydrogen removal energy. Most interestingly, the hydrogen removal energies for LiBHx on GP and with GD are found to be lowered at all the stages (x from 4 to 1) whereas the H-removal energy in the third stage is increased for LiBH4 on fullerene. In addition, the presence of uniformly distributed pores on GP and GD is expected to facilitate the dehydrogenation of light metal complex hydrides. The present results highlight new interesting materials to catalyze light metal complex hydrides for potential application as media for hydrogen storage. Since GD has been successfully synthesized in a recent experiment, we hope the present work will stimulate further experimental investigations in this direction.
Resumo:
Guanxi has become a common term in the wider business community and has attracted an increasing attention of researchers. However, a consistent understanding of the concept continues to be elusive. We critically review the extant guanxi literature to identify the major inconsistencies in the way guanxi is currently conceptualized and develop a conceptualization of guanxi which views guanxi as a complex adaptive system formed by the strategic establishing, evolving, utilizing, and maintaining of personal relationships based upon social norms of trust and reciprocal obligation unique to the Chinese culture. This study contributes to research of guanxi and to the field of Chinese management in several ways. First, we identify four levels of inconsistency surrounding the conceptualization of guanxi in the literature, thus clarifying the current common sources of confusion. Second, this study deconstructs the level and core values of guanxi to provide a more transparent picture, enabling researchers to develop more robust measures of guanxi. Finally, we made progress towards a more comprehensive understanding of guanxi by introducing the complex adaptive system perspective into the guanxi research.