982 resultados para Boyd, Alan
Resumo:
Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.
Resumo:
Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in real world applications and continuous authentication scenarios. One of the main issues is that the presented CBAS are based on several samples of training data either of both intruder and valid users or only the valid users' profile. This means that historical profiles for either the legitimate users or possible attackers should be available or collected before prediction time. However, in some cases it is impractical to gain the biometric data of the user in advance (before detection time). Another issue is the variability of the behaviour of the user between the registered profile obtained during enrollment, and the profile from the testing phase. The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications. Also, the paper discusses a new application for CBAS not requiring any training data either from intruders or from valid users.
Resumo:
Sections contributed by Jean Sim Agricultural Colleges; p.12 Anzac Park, Townsvile; p.22 Anzac Square, Brisbane; pp.22-23 Benson, Albert Herbert; p.86 Bick, Edward Walter; p.88 Bougainvillea Gardens; p.101 Bowen Park; pp.101-102 Boyd, A.J.; p.103 Brisbane Botanic Gardens; pp.104-105 Bush-house; pp.119-121
Resumo:
We present an approach to automating computationally sound proofs of key exchange protocols based on public-key encryption. We show that satisfying the property called occultness in the Dolev-Yao model guarantees the security of a related key exchange protocol in a simple computational model. Security in this simpler model has been shown to imply security in a Bellare {Rogaway-like model. Furthermore, the occultness in the Dolev-Yao model can be searched automatically by a mechanisable procedure. Thus automated proofs for key exchange protocols in the computational model can be achieved. We illustrate the method using the well-known Lowe-Needham-Schroeder protocol.
Resumo:
Lack of a universally accepted and comprehensive taxonomy of cybercrime seriously impedes international efforts to accurately identify, report and monitor cybercrime trends. There is, not surprisingly, a corresponding disconnect internationally on the cybercrime legislation front, a much more serious problem and one which the International Telecommunication Union (ITU) says requires „the urgent attention of all nations‟. Yet, and despite the existence of the Council of Europe Convention on Cybercrime, a proposal for a global cybercrime treaty was rejected by the United Nations (UN) as recently as April 2010. This paper presents a refined and comprehensive taxonomy of cybercrime and demonstrates its utility for widespread use. It analyses how the USA, the UK, Australia and the UAE align with the CoE Convention and finds that more needs to be done to achieve conformance. We conclude with an analysis of the approaches used in Australia, in Queensland, and in the UAE, in Abu Dhabi, to fight cybercrime and identify a number of shared problems.
Resumo:
Universities have not traditionally trained students to work as producers in the entertainment industries. This key entertainment role involves balancing creativity, business and legal skills in order to generate and run entertainment projects. Queensland University of Technology has recently introduced a program to train students for these jobs. The program is interdisciplinary, drawing on expertise from the Creative Industries, Law and Business faculties. This Scholarship of Teaching and Learning (SOTL) article details the course learning outcomes developed from extensive industry and academic consultation, and addresses some of the difficulties involved in developing such an interdisciplinary teaching program.
Resumo:
Technology is not always introduced into educational contexts in ways that position pedagogy to the fore. In optimizing learning, forward looking approaches require that we question what it means to be an educated person in the 21st Century and how individuals should engage with technologies to be suitably equipped for emergent knowledge age work. Responses to such ideas typically emphasize collaborative knowledge building where technology is employed as a tool to think with and allows for the active messing with and the development of ideas, rather than merely being a passive window to information. This paper discusses a very deliberate attempt to address a range of imperatives and competing demands within a high school setting where wireless handheld technologies integrated with a learning management system (Moodle) are used to scaffold and implement knowledge sharing and knowledge-building within the school community.
Resumo:
Even though security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human machine interface. This paper reports on a diary study conducted in order to investigate what people identify as security decisions that they make while using the web. The study aimed to uncover how security is perceived in the individual's context of use. From this data, themes were drawn, with a focus on addressing security goals such as confidentiality and authentication. This study is the first study investigating users' web usage focusing on their self-documented perceptions of security and the security choices they made in their own environment.
Resumo:
A finite element numerical simulation is carried out to examine stress distributions on railhead in the cicinity of the endpost of an insulated rail joint. The contact patch and pressure distribution are considered using modified Hertzian simulation. A combined elasto-plastic material modelling available in Abaqus is employed in the simulation. A dynamic load factor of 1.21 is considered in modelling for the wheel load based on a previous study as part of this on going research. Shakedown theorem is employed in this study. A peak pressure load which is above the shakedown limit is determined as input load. As a result, a progressive damage in the railhead has been captured as depicted in the equivalent plastic strain plot.
Resumo:
The panel "Duplicity/Complicity: Performing and Misperforming Lies" at PSi #15 in Croatia in July 2009 examined the half-truths, hidden assumptions and power relations embedded in every act of performance through an analysis of the way bodies, buildings, personae and communities perform and misperform lies. It was a collection of new academic voices from Australia and Croatia, intersecting and colliding and, at times, outright lying, with each other and with commentary from Alan Read. Inspired by this successful adventure in collaborative academic mis-performance, "The ‘Dirty Work’ of the Lie" takes the challenge set by the Prelude Panel at PSI #15 and subjects the ideas emerging from this panel to "friendly fire" in order to build a multi authored response to 'performance that lies', with reference to the work of A Chorus of Women, disabled artists Bill Shannon, Aaron Williamson and Kathryn Araneillo, US dance performer Ann Liv Young and US theatre and festival director Peter Sellars. In doing so, "The 'Dirty Work' of the Lie" provides a reflexive response to the duplicity inherent in the performances, and also in our own academic analyses. With Alan Read acting as interlocutor, each contributor will creatively respond to a paper presented by another, developing the key intersecting issues that emerged through the formation of the panel. These issues include impression management, self-belief and performers who are 'taken in by their own act', the dirty work of taking others in with an act, the guerrilla dimension of lying, the productivity of the lie, and questions of audience engagement and ethics. As a result, this new paper tests how the 'misperformance' of lies across different cultural sites, be it deliberate or accidental, can become a productive – and, indeed, politicised – aspect of cultural performance, betraying accepted attitudes, ideas and structures of authority and offering alternative visions. Through it’s distinctively multi vocal texture, "The 'Dirty Work' of the Lie" also interrogates the modes of analysis available to us, questioning the 'duplicity' in our reflecting, responding and listening to each other as well as the work.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
To date, the majority of films that utilise or feature hip hop music and culture, have either been in the realms of documentary, or in ‘show musicals’ (where the film musical’s device of characters’ bursting into song, is justified by the narrative of a pursuit of a career in the entertainment industry). Thus, most films that feature hip hop expression have in some way been tied to the subject of hip hop. A research interest and enthusiasm was developed for utilising hip hop expression in film in a new way, which would extend the narrative possibilities of hip hop film to wider topics and themes. The creation of the thesis film Out of My Cloud, and the writing of this accompanying exegesis, investigates a research concern of the potential for the use of hip hop expression in an ‘integrated musical’ film (where characters’ break into song without conceit or explanation). Context and rationale for Out of My Cloud (an Australian hip hop ‘integrated musical’ film) is provided in this writing. It is argued that hip hop is particularly suitable for use in a modern narrative film, and particularly in an ‘integrated musical’ film, due to its: current vibrancy and popularity, rap (vocal element of hip hop) music’s focus on lyrical message and meaning, and rap’s use as an everyday, non-performative method of communication. It is also argued that Australian hip hop deserves greater representation in film and literature due to: its current popularity, and its nature as a unique and distinct form of hip hop. To date, representation of Australian hip hop in film and television has almost solely been restricted to the documentary form. Out of My Cloud borrows from elements of social realist cinema such as: contrasts with mainstream cinema, an exploration/recognition of the relationship between environment and development of character, use of non-actors, location-shooting, a political intent of the filmmaker, displaying sympathy for an underclass, representation of underrepresented character types and topics, and a loose narrative structure that does not offer solid resolution. A case is made that it may be appropriate to marry elements of social realist film with hip hop expression due to common characteristics, such as: representation of marginalised or underrepresented groups and issues in society, political objectives of the artist/s, and sympathy for an underclass. In developing and producing Out of My Cloud, a specific method of working with, and filming actor improvisation was developed. This method was informed by improvisation and associated camera techniques of filmmakers such as Charlie Chaplin, Mike Leigh, Khoa Do, Dogme 95 filmmakers, and Lars von Trier (post-Dogme 95). A review of techniques used by these filmmakers is provided in this writing, as well as the impact it has made on my approach. The method utilised in Out of My Cloud was most influenced by Khoa Do’s technique of guiding actors to improvise fairly loosely, but with a predetermined endpoint in mind. A variation of this technique was developed for use in Out of My Cloud, which involved filming with two cameras to allow edits from multiple angles. Specific processes for creating Out of My Cloud are described and explained in this writing. Particular attention is given to the approaches regarding the story elements and the music elements. Various significant aspects of the process are referred to including the filming and recording of live musical performances, the recording of ‘freestyle’ performances (lyrics composed and performed spontaneously) and the creation of a scored musical scene involving a vocal performance without regular timing or rhythm. The documentation of processes in this writing serve to make the successful elements of this film transferable and replicable to other practitioners in the field, whilst flagging missteps to allow fellow practitioners to avoid similar missteps in future projects. While Out of My Cloud is not without its shortcomings as a short film work (for example in the areas of story and camerawork) it provides a significant contribution to the field as a working example of how hip hop may be utilised in an ‘integrated musical’ film, as well as being a rare example of a narrative film that features Australian hip hop. This film and the accompanying exegesis provide insights that contribute to an understanding of techniques, theories and knowledge in the field of filmmaking practice.
Resumo:
Ureaplasma species are the bacteria most frequently isolated from human amniotic fluid in asymptomatic pregnancies and placental infections. Ureaplasma parvum serovars 3 and 6 are the most prevalent serovars isolated from men and women. We hypothesized that the effects on the fetus and chorioamnion of chronic ureaplasma infection in amniotic fluid are dependent on the serovar, dose, and variation of the ureaplasma multiple banded antigen (MBA) and mba gene. We injected high- or low dose U. parvum serovar 3, serovar 6, or vehicle intra-amniotically into pregnant ewes at 55 days of gestation (term = 150 days) and examined the chorioamnion, amniotic fluid, and fetal lung tissue of animals delivered by cesarean section at 125 days of gestation. Variation of the multiple banded antigen/mba generated by serovar 3 and serovar 6 ureaplasmas in vivo were compared by PCR assay and Western blot. Ureaplasma inoculums demonstrated only one (serovar 3) or two (serovar 6) MBA variants in vitro, but numerous antigenic variants were generated in vivo: serovar 6 passage 1 amniotic fluid cultures contained more MBA size variants than serovar 3 (P = 0.005),and ureaplasma titers were inversely related to the number of variants (P = 0.025). The severity of chorioamnionitis varied between animals. Low numbers of mba size variants (five or fewer) within amniotic fluid were associated with severe inflammation, whereas the chorioamnion from animals with nine or more mba variants showed little or no inflammation. These differences in chorioamnion inflammation may explain why not all women with in utero Ureaplasma spp. experience adverse pregnancy outcomes.
Resumo:
Erythromycin is the standard antibiotic used for treatment of Ureaplasma species during 3 pregnancy; however, maternally administered erythromycin may be ineffective at eliminating 4 intra-amniotic ureaplasma infections. We asked if erythromycin would eradicate intra-amniotic 5 ureaplasma infections in pregnant sheep. At 50 days of gestation (d, term=150d) pregnant ewes 6 received intra-amniotic injections of erythromycin-sensitive U. parvum serovar 3 (n=16) or 10B 7 medium (n=16). At 100d, amniocentesis was performed; five fetal losses (ureaplasma group: 8 n=4; 10B group: n=1) had occurred by this time. Remaining ewes were allocated into treatment 9 subgroups: medium only (M, n=7); medium and erythromycin (M/E, n=8); ureaplasma only (Up, 10 n=6) or ureaplasma and erythromycin (Up/E, n=6). Erythromycin was administered intra11 muscularly (500 mg), eight-hourly for four days (100d-104d). Amniotic fluid samples were 12 collected at 105d. At 125d preterm fetuses were surgically delivered and specimens were 13 collected for culture and histology. Erythromycin was quantified in amniotic fluid by liquid 14 chromatography-mass spectrometry. Ureaplasmas were isolated from the amniotic fluid, 15 chorioamnion and fetal lung of animals from the Up and Up/E groups, however, the numbers of 16 U. parvum recovered were not different between these groups. Inflammation in the 17 chorioamnion, cord and fetal lung was increased in ureaplasma-exposed animals compared to 18 controls, but was not different between the Up and Up/E groups. Erythromycin was detected in 19 amniotic fluid samples, although concentrations were low (<10-76 ng/mL). This study 20 demonstrates that maternally administered erythromycin does not eradicate chronic, intra- amniotic ureaplasma infections or improve fetal outcomes in an ovine model, potentially due to 22 the poor placental passage of erythromycin.
Resumo:
Objective: To assess the efficacy of maternal betamethasone for improving preterm lung function, in the presence of inflammation induced by amniotic fluid ureaplasma colonization. ----- ----- Study design: Ewes bearing single fetuses were randomized to receive an intra-amniotic injection of Ureaplasma parvum (serovar 6; 2×107 colony forming units) or vehicle at 86±2 days of pregnancy (mean±SD: term is 150d), followed by maternal intramuscular betamethasone (0.5mg/kg) or saline, either 2 or 7 days before delivery of lambs at 123±1d. ----- ----- Results: Amniotic fluid IL-8 was elevated by ureaplasmas (p=0.049) but unaffected by betamethasone. Lung inflammation induced by ureaplasmas was not affected by betamethasone. Lung compliance was increased by ureaplasma colonization (p=0.009) and betamethasone (p=0.042), and effects were additive. Lung surfactant was increased by ureaplasma colonization (p<0.001) and betamethasone 7 days (p=0.001), but not 2 days, before delivery. ----- ----- Conclusion: Inflammation improves preterm lung function due to increases in surfactant. Antenatal corticosteroids further augment lung function, through an apparently independent mechanism.