958 resultados para Key management


Relevância:

70.00% 70.00%

Publicador:

Resumo:

An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Background: Successful management of atopic dermatitis poses a significant and ongoing challenge to parents of affected children. Despite frequent reports of child behaviour problems and parenting difficulties, there is a paucity of literature examining relationships between child behaviour and parents' confidence and competence with treatment. Objectives: To examine relationships between child, parent, and family variables, parents' self-efficacy for managing atopic dermatitis, self-reported performance of management tasks, observed competence with providing treatment, and atopic dermatitis severity. Design: Cross-sectional study design. Participants A sample of 64 parent-child dyads was recruited from the dermatology clinic of a paediatric tertiary referral hospital in Brisbane, Australia. Methods: Parents completed self-report questionnaires examining child behaviour, parents' adjustment, parenting conflict, parents' relationship satisfaction, and parents' self-efficacy and self-reported performance of key management tasks. Severity of atopic dermatitis was assessed using the Scoring Atopic Dermatitis index. A routine home treatment session was observed, and parents' competence in carrying out the child's treatment assessed. Results: Pearson's and Spearman's correlations identified significant relationships (p< .05) between parents' self-efficacy and disease severity, child behaviour difficulties, parent depression and stress, parenting conflict, and relationship satisfaction. There were also significant relationships between each of these variables and parents' self-reported performance of management tasks. More profound child behaviour difficulties were associated with more severe atopic dermatitis and greater parent stress. Using multiple linear regressions, significant proportions of variation in parents' self-efficacy and self-reported task performance were explained by child behaviour difficulties and parents' formal education. Self-efficacy emerged as a likely mediator for relationships between both child behaviour and parents' education, and self-reported task performance. Direct observation of treatment sessions revealed strong relationships between parents' treatment competence and parents' self-efficacy, outcome expectations, and self-reported task performance. Less competent task performance was also associated with greater parent-reported child behaviour difficulties, parent depression and stress, parenting conflict, and relationship dissatisfaction. Conclusion: This study revealed the importance of child behaviour to parents' confidence and practices in the context of atopic dermatitis management. Children with more severe atopic dermatitis are at risk of presenting with challenging behaviour problems and their parents struggle to manage the condition successfully.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

A major outcome of this project has been the identification and prioritisation of the major management issues related to the ecological impacts of fish stocking and the elucidation of appropriate research methodologies that can be used to investigate these issues. This information is paramount to development of the relevant research projects that will lead to stocking activities aligned with world’s best practice, a requisite for ecologically sustainable recreational freshwater fisheries. In order to quantify the major management issues allied to the sustainability of freshwater fish stocking, stakeholders from around Australia were identified and sent a questionnaire to determine which particular issues they regarded as important. These stakeholders included fisheries managers or researchers from Federal, Territory and State jurisdictions although others, including representatives from environment and conservation agencies and peak recreational fishing and stocking groups were also invited to give their opinions. The survey was completed in late 2007 and the results analysed to give a prioritized list of key management issues relating to the impacts of native fish stocking activities. In the analysis, issues which received high priority rankings were flagged as potential topics for discussion at a future expert workshop. Identified high priority issues fell into the following core areas: marking techniques, genetics, population dynamics, introduction of pathogens and exotic biological material and ecological, biological and conservation issues. The next planned outcome, determination of the most appropriate methodologies to address these core issues in research projects, was addressed through the outputs of an expert workshop held in early 2008. Participants at this workshop agreed on a range of methodologies for addressing priority sustainability issues and decided under what circumstances that these methodologies should be employed.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Rainfall variability is a major challenge to sustainable grazing management in northern Australia, with management often complicated further by large, spatially-heterogeneous paddocks. This paper presents the latest grazing research and associated bio-economic modelling from northern Australia and assesses the extent to which current recommendations to manage for these issues are supported. Overall, stocking around the safe long-term carrying capacity will maintain land condition and maximise long-term profitability. However, stocking rates should be varied in a risk-averse manner as pasture availability varies between years. Periodic wet-season spelling is also essential to maintain pasture condition and allow recovery of overgrazed areas. Uneven grazing distributions can be partially managed through fencing, providing additional water-points and in some cases patch-burning, although the economics of infrastructure development are extremely context-dependent. Overall, complex multi-paddock grazing systems do not appear justified in northern Australia. Provided the key management principles outlined above are applied in an active, adaptive manner, acceptable economic and environmental outcomes will be achieved irrespective of the grazing system applied.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Cryptococcosis is a global invasive mycosis associated with significant morbidity and mortality. These guidelines for its management have been built on the previous Infectious Diseases Society of America guidelines from 2000 and include new sections. There is a discussion of the management of cryptococcal meningoencephalitis in 3 risk groups: (1) human immunodeficiency virus (HIV)-infected individuals, (2) organ transplant recipients, and (3) non-HIV-infected and nontransplant hosts. There are specific recommendations for other unique risk populations, such as children, pregnant women, persons in resource-limited environments, and those with Cryptococcus gattii infection. Recommendations for management also include other sites of infection, including strategies for pulmonary cryptococcosis. Emphasis has been placed on potential complications in management of cryptococcal infection, including increased intracranial pressure, immune reconstitution inflammatory syndrome (IRIS), drug resistance, and cryptococcomas. Three key management principles have been articulated: (1) induction therapy for meningoencephalitis using fungicidal regimens, such as a polyene and flucytosine, followed by suppressive regimens using fluconazole; (2) importance of early recognition and treatment of increased intracranial pressure and/or IRIS; and (3) the use of lipid formulations of amphotericin B regimens in patients with renal impairment. Cryptococcosis remains a challenging management issue, with little new drug development or recent definitive studies. However, if the diagnosis is made early, if clinicians adhere to the basic principles of these guidelines, and if the underlying disease is controlled, then cryptococcosis can be managed successfully in the vast majority of patients.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper identifies some significant gaps in our knowledge of the configuration and performance of the property asset management sector. It is argued that, as many leading academic property researchers have focussed on financial vehicles and modelling, in-depth analysis of property assets and their management has been neglected. In terms of potential for future in-depth research, three key broad preliminary research themes or questions are identified. First, how do the active management opportunities presented, costs of management and the key management tasks vary with market conditions, asset type and life-cycle stage? Second, how is property asset management delivered and what are the main costs and benefits of different models of procurement? Finally, what are the appropriate metrics for measuring the performance of different property managers and approaches to property management? It is concluded that the lack of published materials addressing these issues has implications for educating property students.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Wireless mesh networks (WMNs) have the ability to integrate with other networks while providing a fast and cost-saving deployment. The network security is one of important challenge problems in this kind of networks. This paper is focused on key management between mesh and sensor networks. We propose an efficient key pre-distribution scheme based on two polynomials in wireless mesh networks by employing the nature of heterogeneity. Our scheme realizes the property of bloom filters, i.e., neighbor nodes can discover their shared keys but have no knowledge on the different keys possessed by the other node, without the probability of false positive. The analysis presented in this paper shows that our scheme has the ability to establish three different security level keys and achieves the property of self adaptive security for sensor networks with acceptable computation and communication consumption.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Many key management protocols have been specifically designed for wireless sensor networks. However, most of the key management protocols focus on the establishment of the required keys or the removal of the compromised keys. The design of these key management protocols does not consider the support of higher level security applications. When the applications are integrated later in sensor networks, new mechanisms must be designed. In this paper, we propose a security framework, uKeying, for wireless sensor networks. This framework can be easily extended to support many security applications. It includes three components: a security mechanism to provide secrecy for communications in sensor networks, an efficient session key distribution scheme, and a centralized key revocation scheme. The proposed framework does not depend on a specific key distribution scheme and can be used to support many security applications, such as secure group communications. Our analysis shows that the framework is secure, efficient, and extensible. The simulation and results also reveal for the first time that a centralized key revocation scheme can also attain a high efficiency.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Purpose – The purpose of the paper is to present the findings of a study of factory closure management. It details the sequence and the results of the key strategic manufacturing management decisions made from the time of the announcement of the plant closure to the cessation of operations. The paper also includes an analysis of the human resource management (HRM) actions taken during this same time period and their consequences upon all those involved in the closure management process. Design/methodology/approach – The case study methodology consisted of two initial site visits to monitor closure management effectiveness (adherence to plan and the types and frequency of closure management communications). During these visits, documentary evidence of the impact of the closure decision upon production performance was also collected (manufacturing output and quality performance data). Following plant closure, interviews were held with senior business, production and HRM managers and production personnel. A total of 12 interviews were carried out. Findings – The case study findings have informed the development of a conceptual model of facility closure management. Information obtained from the interviews suggests that the facility closure management process consists of five key management activities. The unexpected announcement of a factory closure can cause behavioural changes similar to those of bereavement, particularly by those employees who are its survivors. In addition, similar reactions to the closure announcement may be displayed by those who choose to remain employed by the factory owner throughout the phased closure of the plant. Originality/value – Facility closure management is an insufficiently researched strategic operations management activity. This paper details a recommended procedure for its management. A conceptual model has also been developed to illustrate the links between the key facility closure management tasks and the range of employee changes of behaviour that can be induced by their execution.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

There has been concern in the literature about the adequacy of the traditional model of marketing planning, which focuses on what decisions should be made and not on how to make them. The aim of this article is a new conceptualisation that proposes key management processes about how marketing planning decisions are made in a dynamic context. The motives for this conceptualisation are to contribute to understanding by advancing the traditional model of marketing planning, to stimulate academic and practitioner debate about how marketing planning decisions are made, and to initiate new directions in marketing planning research. Two new competing models of marketing planning are developed, which address key management processes about how marketing planning decisions are made in a dynamic context, and research directions are proposed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.