995 resultados para conference proceedings


Relevância:

60.00% 60.00%

Publicador:

Resumo:

We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong \cite{DBLP:conf/acisp/HuangW07}. We use a direct construction from Kiltz and Galindo's KEM scheme \cite{DBLP:conf/acisp/KiltzG06} to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction. We also address the security flaw discovered by Selvi et al. \cite{cryptoeprint:2009:462}.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Offering service bundles to the market is a promising option for service providers to strengthen their competitive advantages, cope with dynamic market conditions and deal with heterogeneous consumer demand. Although the expected positive effects of bundling strategies and pricing considerations for bundles are covered well by the available literature, limited guidance can be found regarding the identification of potential bundle candidates and the actual process of bundling. The contribution of this paper is the positioning of bundling based on insights from both business and computer science and the proposition of a structured bundling method, which guides organizations with the composition of bundles in practice.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Service bundling can be regarded as an option for service providers to strengthen their competitive advantages, cope with dynamic market conditions and heterogeneous consumer demand. Despite these positive effects, actual guidance for the identification of service bundles and the act of bundling itself can be regarded as a gap. Previous research has resulted in a conceptualization of a service bundling method relying on a structured service description in order to fill this gap. This method addresses the reasoning about the suitability of services to be part of a bundle based on analyzing existing relationships between services captured by a description language. This paper extends the aforementioned research by presenting an initial set of empirically derived relationships between services in existing bundles that can subsequently be utilized to identify potential new bundles. Additionally, a gap analysis points out to what extent prominent ontologies and service description languages accommodate for the identified relationships.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is defined. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, but is unlikely to occur either randomly or in applications. However, by deleting certain vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn the system of polynomial equations would be separated into smaller systems of near-equal sizes. In graph theory terms, this process is equivalent to finding balanced vertex partitions with minimum-weight vertex separators. The techniques of finding these vertex partitions are discussed, and experiments are performed to evaluate its practicality for general graphs and systems of polynomial equations. Applications of this approach in algebraic cryptanalysis on symmetric ciphers are presented: For the QUAD family of stream ciphers, we show how a malicious party can manufacture conforming systems that can be easily broken. For the stream ciphers Bivium and Trivium, we nachieve significant speedups in algebraic attacks against them, mainly in a partial key guess scenario. In each of these cases, the systems of polynomial equations involved are well-suited to our graph partitioning method. These results may open a new avenue for evaluating the security of symmetric ciphers against algebraic attacks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Field studies show that the internal screens in a gross pollutant trap (GPT) are often clogged with organic matter, due to infrequent cleaning. The hydrodynamic performance of a GPT with fully blocked screens was comprehensively investigated under a typical range of onsite operating conditions. Using an acoustic Doppler velocimeter (ADV), velocity profiles across three critical sections of the GPT were measured and integrated to examine the net fluid flow at each section. The data revealed that when the screens are fully blocked, the flow structure within the GPT radically changes. Consequently, the capture/retention performance of the device rapidly deteriorates. Good agreement was achieved between the experimental and the previous 2D computational fluid dynamics (CFD) velocity profiles for the lower GPT inlet flow conditions.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A technique was developed to investigate the capture/retention characteristic of a gross pollutant trap (GPT) with fully and partially blocked internal screens. Custom modified spheres of variable density filled with liquid were released into the GPT inlet and monitored at the outlet. The outlet data shows that the capture/retention performances of a GPT with fully blocked screens deteriorate rapidly. During higher flow rates, screen blockages below 68% approach maximum efficiency. At lower flow rates, the high performance trend is reversed and the variation in behaviour of pollutants with different densities becomes more noticeable. Additional experiments with a second upstream inlet configured GPT showed an improved capture/retention performance. It was also noted that the bypass allows the incoming pollutants to escape when the GPT is blocked. This useful feature prevents upstream blockages between cleaning intervals.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Coal seam gas (CSG) exploration and development requires the abstraction of significant amounts of water. This is so because gas desorbtion in coal seams takes place only after aquifer pressure has been reduced by prolonged pumping of aquifer water. CSG waters have a specific geochemical signature which is a product of their formation process. These waters have high bicarbonate, high sodium, low calcium, low magnesium, and very low sulphate concentrations. Additionally, chloride concentrations may be high depending on the coal depositional environment. This particular signature is not only useful for exploration purposes, but it also highlights potential environmental issues that can arise as a consequence of CSG water disposal. Since 2002 L&M Coal Seam Gas Ltd and CRL Energy Ltd, have been involved in exploration and development of CSG in New Zealand. Anticipating disposal of CSG waters as a key issue in CSG development, they have been assessing CSG water quality along with exploration work. Coal seam gas water samples from an exploration well in Maramarua closely follow the geochemical signature associated with CSG waters. This has helped to identify CSG potential, while at the same time assessing the chemical characteristics and water generation processes in the aquifer. Neutral pH and high alkalinity suggest that these waters could be easily managed once the sodium and chloride concentrations are reduced to acceptable levels.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Australia, road crash trauma costs the nation A$15 billion annually whilst the US estimates an economic impact of around US$ 230 billion on its network. Worldwide economic cost of road crashes is estimated to be around US$ 518 billion each year. Road accidents occur due to a number of factors including driver behaviour, geometric alignment, vehicle characteristics, environmental impacts, and the type and condition of the road surfacing. Skid resistance is considered one of the most important road surface characteristics because it has a direct effect on traffic safety. In 2005, Austroads (the Association of Australian and New Zealand Road Transport and Traffic Authorities) published a guideline for the management of skid resistance and Queensland Department of Main Roads (QDMR) developed a skid resistance management plan (SRMP). The current QDMR strategy is based on rationale analytical methodology supported by field inspection with related asset management decision tools. The Austroads’s guideline and QDMR's skid resistance management plan have prompted QDMR to review its skid resistance management practice. As a result, a joint research project involving QDMR, Queensland University of Technology (QUT) and the Corporative Research Centre for Integrated Engineering Asset Management (CRC CIEAM) was formed. The research project aims at investigating whether there is significant relationship between road crashes and skid resistance on Queensland’s road networks. If there is, the current skid resistance management practice of QDMR will be reviewed and appropriate skid resistance investigatory levels will be recommended. This paper presents analysis results in assessing the relationship between wet crashes and skid resistance on Queensland roads. Attributes considered in the analysis include surface types, annual average daily traffic (AADT), speed and seal age.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Voice recognition is one of the key enablers to reduce driver distraction as in-vehicle systems become more and more complex. With the integration of voice recognition in vehicles, safety and usability are improved as the driver’s eyes and hands are not required to operate system controls. Whilst speaker independent voice recognition is well developed, performance in high noise environments (e.g. vehicles) is still limited. La Trobe University and Queensland University of Technology have developed a low-cost hardware-based speech enhancement system for automotive environments based on spectral subtraction and delay–sum beamforming techniques. The enhancement algorithms have been optimised using authentic Australian English collected under typical driving conditions. Performance tests conducted using speech data collected under variety of vehicle noise conditions demonstrate a word recognition rate improvement in the order of 10% or more under the noisiest conditions. Currently developed to a proof of concept stage there is potential for even greater performance improvement.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Zero energy buildings (ZEB) and zero energy homes (ZEH) are a current hot topic globally for policy makers (what are the benefits and costs), designers (how do we design them), the construction industry (can we build them), marketing (will consumers buy them) and researchers (do they work and what are the implications). This paper presents initial findings from actual measured data from a 9 star (as built), off-ground detached family home constructed in south-east Queensland in 2008. The integrated systems approach to the design of the house is analysed in each of its three main goals: maximising the thermal performance of the building envelope, minimising energy demand whilst maintaining energy service levels, and implementing a multi-pronged low carbon approach to energy supply. The performance outcomes of each of these stages are evaluated against definitions of Net Zero Carbon / Net Zero Emissions (Site and Source) and Net Zero Energy (onsite generation v primary energy imports). The paper will conclude with a summary of the multiple benefits of combining very high efficiency building envelopes with diverse energy management strategies: a robustness, resilience, affordability and autonomy not generally seen in housing.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Currently in Australia, there are no decision support tools for traffic and transport engineers to assess the crash risk potential of proposed road projects at design level. A selection of equivalent tools already exists for traffic performance assessment, e.g. aaSIDRA or VISSIM. The Urban Crash Risk Assessment Tool (UCRAT) was developed for VicRoads by ARRB Group to promote methodical identification of future crash risks arising from proposed road infrastructure, where safety cannot be evaluated based on past crash history. The tool will assist practitioners with key design decisions to arrive at the safest and the most cost -optimal design options. This paper details the development and application of UCRAT software. This professional tool may be used to calculate an expected mean number of casualty crashes for an intersection, a road link or defined road network consisting of a number of such elements. The mean number of crashes provides a measure of risk associated with the proposed functional design and allows evaluation of alternative options. The tool is based on historical data for existing road infrastructure in metropolitan Melbourne and takes into account the influence of key design features, traffic volumes, road function and the speed environment. Crash prediction modelling and risk assessment approaches were combined to develop its unique algorithms. The tool has application in such projects as road access proposals associated with land use developments, public transport integration projects and new road corridor upgrade proposals.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We present an approach to automating computationally sound proofs of key exchange protocols based on public-key encryption. We show that satisfying the property called occultness in the Dolev-Yao model guarantees the security of a related key exchange protocol in a simple computational model. Security in this simpler model has been shown to imply security in a Bellare {Rogaway-like model. Furthermore, the occultness in the Dolev-Yao model can be searched automatically by a mechanisable procedure. Thus automated proofs for key exchange protocols in the computational model can be achieved. We illustrate the method using the well-known Lowe-Needham-Schroeder protocol.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper explores the role of culture in Knowledge Management (KM) through a spectrum of cultural and institutional perspectives. The case studies cover a wide range of countries in Africa, Asia, the Middle East, Latin America as well as transition economies of the former socialist countries in Eastern Europe. The paper demonstrates how knowledge management processes and practices are influenced by local culture and institutions as well as interaction with the broader international community.