922 resultados para secure protocal
Resumo:
Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to the regulations and laws that require data and operations to reside in specific geographic locations. Thus, data owners may need to ensure that their cloud providers do not compromise the SLA contract and move their data into another geographic location. This paper introduces an architecture for a new approach for geographic location assurance, which combines the proof of storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. This architecture aims to achieve better security and more flexible geographic assurance within the environment of cloud computing.
Resumo:
Non-state insurgent actors are too weak to compel powerful adversaries to their will, so they use violence to coerce. A principal objective is to grow and sustain violent resistance to the point that it either militarily challenges the state, or more commonly, generates unacceptable political costs. To survive, insurgents must shift popular support away from the state and to grow they must secure it. State actor policies and actions perceived as illegitimate and oppressive by the insurgent constituency can generate these shifts. A promising insurgent strategy is to attack states in ways that lead angry publics and leaders to discount the historically established risks and take flawed but popular decisions to use repressive measures. Such decisions may be enabled by a visceral belief in the power of coercion and selective use of examples of where robust measures have indeed suppressed resistance. To avoid such counterproductive behaviours the cases of apparent 'successful repression' must be understood. This thesis tests whether robust state action is correlated with reduced support for insurgents, analyses the causal mechanisms of such shifts and examines whether such reduction is because of compulsion or coercion? The approach is founded on prior research by the RAND Corporation which analysed the 30 insurgencies most recently resolved worldwide to determine factors of counterinsurgent success. This new study first re-analyses their data at a finer resolution with new queries that investigate the relationship between repression and insurgent active support. Having determined that, in general, repression does not correlate with decreased insurgent support, this study then analyses two cases in which the data suggests repression seems likely to be reducing insurgent support: the PKK in Turkey and the insurgency against the Vietnamese-sponsored regime after their ousting of the Khmer Rouge. It applies 'structured-focused' case analysis with questions partly built from the insurgency model of Leites and Wolf, who are associated with the advocacy of US robust means in Vietnam. This is thus a test of 'most difficult' cases using a 'least likely' test model. Nevertheless, the findings refute the deterrence argument of 'iron fist' advocates. Robust approaches may physically prevent effective support of insurgents but they do not coercively deter people from being willing to actively support the insurgency.
Resumo:
Background: It is imperative to understand how to engage young women in research about issues that are important to them. There is limited reliable data on how young women access contraception in Australia especially in rural areas where services may be less available. Objective: This paper identifies the challenges involved in engaging young Australian women aged 18-23 years to participate in a web-based survey on contraception and pregnancy and ensure their ongoing commitment to follow-up web-based surveys. Methods: A group of young women, aged 18-23 years and living in urban and rural New South Wales, Australia, were recruited to participate in face-to-face discussions using several methods of recruitment: direct contact (face-to-face, telephone or email)and snowball sampling by potential participants inviting their friends. All discussions were transcribed verbatim and analyzed using thematic analysis. Results: Twenty young women participated (urban, n=10: mean age 21.6 years; rural, n=10: 20.0 years) and all used computers or smart phones to access the internet on a daily basis. All participants were concerned about the cost of internet access and utilized free access to social media on their mobile phones. Their willingness to participate in a web-based survey was dependent on incentives with a preference for small financial rewards. Most participants were concerned about their personal details and survey responses remaining confidential and secure. The most appropriate survey would take up to 15 minutes to complete, be a mix of short and long questions and eye-catching with bright colours. Questions on the sensitive topics of sexual activity, contraception and pregnancy were acceptable if they could respond with “I prefer not to answer”. Conclusions: There are demographic, participation and survey design challenges in engaging young women in a web-based survey. Based on our findings, future research efforts are needed to understand the full extent of the role social media and incentives play in the decision of young women to participate in web-based research.
Resumo:
Over the last ten years, approximately one third of refugee and humanitarian entrants to Australia have been adult men. To date, little research has been done on their health and settlement issues. Many of these men have come from the African continent. This paper reports on the educational and employment outcomes of a group of 173 recently arrived adult African men from refugee backgrounds who have settled in Southeast Queensland. Given the current government policy focus on regional resettlement, the paper compares key outcomes between the adult African men who settled in metropolitan Brisbane with those living in the Toowoomba-Gatton region. The study uses a peer interviewer model and a mixed method approach. Overall, we have found that African men who have settled in regional areas face significantly greater educational and occupational challenges than those who settled in the urban area. They report more negative experiences at educational institutions, are more likely to take jobs that are below their level of skills and qualifications, are more dissatisfied with their jobs, and report greater discrimination and difficulties while trying to secure adequate employment in Australia. A number of policy implications are discussed.
Resumo:
Introduction: Food insecurity is the limited/uncertain availability, access to or ability to acquire nutritionally-adequate, culturallyrelevant and safe foods. Adults suffering from food insecurity are at risk of inadequate nutrient intakes or, paradoxically, overweight/ obesity and the development of chronic disease. Despite the global financial crisis and rising costs of living, there are few studies investigating the potential dietary consequences of food insecurity among the Australian population. This study examined whether food insecurity was associated with weight status and poorer intakes of fruits, vegetable and takeaway foods among adults residing in socioeconomically-disadvantaged urbanised areas. Methods: In this cross-sectional study, a random sample of residents (n=1000) were selected from the most disadvantaged suburbs of Brisbane city (response rate 51%). Data were collected by postal questionnaire which ascertained information on sociodemographic information, household food security status, height, weight, fruit and vegetable intakes and takeaway consumption. Data were analysed using chi-square and logistic regression. Results: The overall prevalence of food insecurity was 31%. Food insecurity was not associated with weight status among men or women. Associations between food security status and potential dietary consequences differed for men and women. Among women, food security was not associated with intakes of fruit, vegetable or takeaway consumption. Contrastingly, among men food security was associated with vegetable intakes and consumption of takeaway food: men reporting food insecurity had lower intakes of vegetables and were more likely to consume takeaway foods compared to those that were food secure. Conclusion: Food security is an important public health issue in Australia and has potential dietary consequences that may adversely affect the health of food-insecure groups, most notably men residing in food-insecure households.
Resumo:
Over the last five years we have observed the fallout from the global financial crisis (GFC). International cooperation and jointly adopted policies have dominated many of the solutions to the problems which have arisen. Initially, many nations in response to the GFC, implemented a two pronged short term solution by undertaking fiscal intervention and delivering rescue packages aimed at first, bailing out financial institutions and second, preventing or minimising the impact of a recession. Both programs involved large amounts of domestic spending. It was difficult in early 2007 to foresee the reduction that nations were about the face in domestic revenue collected. Five years on, not only have the first line effects of the GFC reduced the revenue raised by governments around the world, but the consequential costs associated with the rescue packages have also depleted domestic revenue bases. The response by stakeholders has been to attempt to secure domestic revenue bases through fiscally sustainable measures. Domestic sovereignty allows the levying of taxes as a nation chooses. However, rather than raise domestic taxes, revenue may also be increased by stemming the flow of income and capital to low and no-tax jurisdictions. The intervening five-year period since the GFC allows a unique insight into the response by nations and international organisations to tax evasion, tax avoidance and aggressive tax competition through the cross border flows of capital and the resulting affect that the GFC has had on international tax cooperation. By investigating the change in the international tax landscape over the last five years, which reveals the work done by stakeholders in developing fiscally responsible responses to the problems that have arisen, it may be possible to predict the trajectory of the international tax landscape over the next five years.
Resumo:
Food insecurity is the inadequate access to, or availability of, sufficient amounts of nutritious, culturally-appropriate and safe foods, or the inability to acquire such foods by socially acceptable means. Food insecurity has been shown to be associated with poor dietary intakes and poor health status. Recently, evidence has emerged suggesting increased rates of food insecurity among those with substance abuse problems, including those who smoke. This cross-sectional study investigates the potential moderating effect of smoking on the association between food insecurity and fruit and vegetable intakes among the Australian population, using regression analyses. Participants were adults 18 years and older participating in the 2004/05 National Health Survey (n = 19,500). Those from food insecure households were up to two-times more likely to report inadequate fruit and vegetable intakes compared to those who were food secure. Those who smoked were nearly six times more likely to report being food insecure, and up to three-times more likely to report inadequate fruit and vegetable intakes, compared to their non-smoking counterparts. Further analyses revealed a marked decline in the strength of the association between food insecurity and fruit consumption with the addition of smoking status into a regression model. These findings have important implications for the development of policy and interventions to address food insecurity, suggesting that those from food insecure households are less likely to comply with national dietary recommendations, and that this may in part be moderated by smoking status.
Resumo:
Food insecurity is the limited availability of, or access to, sufficient amounts of nutritious, culturally-appropriate and safe foods, or the inability to access such foods by socially-acceptable means. Evidence from the United States and Canada suggests that food insecurity may be associated with poor dietary intakes, obesity, and chronic disease including depression and diabetes, thus constituting a significant public health issue. Currently, no existing studies have investigated the dietary and health factors associated with food insecurity among the general Australian population. The current study investigated the potential associations between food insecurity, diet and health among Australian adults (18 years and over) participating in the cross-sectional National Health Survey (n = 19,500). Data were analysed by logistic regression adjusting for sociodemographic covariates. Those from food insecure households were 50% less likely to consume the recommended number of servings of fruit, 60% more likely to report poor health and experienced a 6-fold increase in the risk of severe depressive disorders, compared to their food secure counterparts. Furthermore, food insecurity was associated with a 50% increase in the risk of being diagnosed with ‘high sugar levels’. Finally, women from food insecure households were 30% more likely to be obese compared to their food secure counterparts. These findings suggest that food insecurity may play an important role in preventing adherence with national dietary recommendations, and may increase the risk of obesity and chronic illness. This has important implications for both clinical practice, and the development of interventions and policy to address food insecurity.
Resumo:
This paper extends the understanding of working-time changes and work-life balance (WLB) through analyzing a case study where a reduction in working hours designed to assist the workforce in balancing work and nonwork life was implemented. An alliance project in the Australian construction industry was established initially with a 5-day working week, a departure from the industry-standard 6-day week. However, a range of factors complicated the success of this initiative, and the industry-standard 6-day working week was reinstated for the project. The authors argue that this case is valuable in determining the complex mix of influences that work against a wholesale or straightforward adoption of working-time adjustments and work-life balance practices. It is concluded that although the prevailing workplace culture is considered an important factor in the determination of working time, structural and workplace principles and practices may also be critical in working to secure the successful introduction of working-time reduction and work-life balance initiatives in the construction industry in the future.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.
Resumo:
This article assesses undergraduate teaching students’ assertion that there are no right and wrong answers in teaching philosophy. When asked questions about their experiences of philosophy in the classroom for primary children, their unanimous declaration that teaching philosophy has ‘no right and wrong answers’ is critically examined across the three sub-disciplinary areas to which they were generally referring, namely, pedagogy, ethics, and epistemology. From a pedagogical point of view, it is argued that some teaching approaches may indeed be more effective than others, and some pupils’ opinions less defensible, but pedagogically, in terms of managing the power relations in the classroom, it is counter-productive to continually insist on notions of truth and falsity at every point. From an ethical point of view, it is contended that anti-realist approaches to meta-ethics may represent a viable intellectual position, but from the point of view of normative ethics, notions of right and wrong still retain significant currency. From an epistemological point of view, it is argued using Karl Poppers’ work that while it may be difficult to determine what constitutes a right answer, determining a wrong one is far more straightforward. In conclusion, it is clear that prospective teachers engaging in philosophy in the classroom, and also future teachers in general, require a far more nuanced philosophical understanding of the notions of right and wrong and truth and falsity. In view of this situation, it we wish to promote the effective teaching of philosophical thinking to children, or produce educators who can understand the conceptual limits of the claims they make and their very real and often serious practical and social consequences, it is recommended that philosophy be reinstated to a fundamental, foundational place within the pre-service teaching curriculum.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
The use of public space by children and young people is a contentious issue in a number of developed and developing countries and a range of measures are frequently deployed to control the public space which usually deny the rights of children and young people to claim the space for their use. Child and youth curfews, oppressive camera surveillance and the unwarranted attentions of police and private security personnel as control measures in public space undermine attempts to secure greater participation by children and young people in constructing positive strategies to address concerns that impact on them and others in a local area. Evidence from research in Scotland undertaken by Article 12 (2000) suggests that young people felt strongly that they did not count in local community matters and decision making and the imposition on them of a curfew by the adult world of the local area created resentment both at the harshness of the measure and disappointment at an opportunity lost to be consulted and involved in dealing with perceived problems of the locality. This is an important cluster of linked issues as Brown (1998:116) argues that young people are ‘selectively constructed as “problem” and “other” with their concerns marginalised, their lifestyles problematised and their voices subdued’, and this flows into their use of public space as their claims to its use as an aspect of social citizenship are usually cast as inferior or rejected as they ‘stand outside the formal polity’ as ‘non persons’. This has major implications for the ways in which young people view their position in a community as many report a feeling of not being wanted, valued or tolerated. The ‘youth question’ according to Davis (1990) acts as a form of ‘screen’ on which observers and analysts project hopes and fears about the state of society, while in the view of Loader (1996:89) the ‘question of young people’ sits within a discourse comprising two elements, the one being youth, particularly young males, as the ‘harbinger of often unwelcome social change and threat’ and the other element ‘constructs young people as vulnerable’. This discourse of threat is further exemplified in the separation of children from teenagers as Valentine (1996) suggests, the treatment of younger children using public space is often dramatically different to that of older children and the most feared stage of all, 'youth'