1000 resultados para SELECTIVE ENCRYPTION


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Solar ultraviolet (UV) radiation causes a range of skin disorders as well as affecting vision and the immune system. It also inhibits development of plants and animals. UV radiation monitoring is used routinely in some locations in order to alert the population to harmful solar radiation levels. There is ongoing research to develop UV-selective-sensors [1–3]. A personal, inexpensive and simple UV-selective-sensor would be desirable to measure UV intensity exposure. A prototype of such a detector has been developed and evaluated in our laboratory. It comprises a sealed two-electrode photoelectrochemical cell (PEC) based on nanocrystalline TiO2. This abundant semiconducting oxide, which is innocuous and very sta-ble, is the subject of intense study at present due to its application in dye sensitized solar cells (DSSC) [4]. Since TiO2 has a wide band gap (EG = 3.0 eV for rutile and EG = 3.2 eV for anatase), it is inher-ently UV-selective, so that UV filters are not required. This further reduces the cost of the proposed photodetector in comparison with conventional silicon detectors. The PEC is a semiconductor–electrolyte device that generates a photovoltage when it is illuminated and a corresponding photocur-rent if the external circuit is closed. The device does not require external bias, and the short circuit current is generally a linear function of illumination intensity. This greatly simplifies the elec-trical circuit needed when using the PEC as a photodetector. DSSC technology, which is based on a PEC containing nanocrystalline TiO2 sensitized with a ruthenium dye, holds out the promise of solar cells that are significantly cheaper than traditional silicon solar cells. The UV-sensor proposed in this paper relies on the cre-ation of electron–hole pairs in the TiO2 by UV radiation, so that it would be even cheaper than a DSSC since no sensitizer dye is needed. Although TiO2 has been reported as a suitable material for UV sensing [3], to the best of our knowledge, the PEC configuration described in the present paper is a new approach. In the present study, a novel double-layer TiO2 structure has been investigated. Fabrication is based on a simple and inexpensive technique for nanostructured TiO2 deposition using microwave-activated chemical bath deposition (MW-CBD) that has been reported recently [5]. The highly transparent TiO2 (anatase) films obtained are densely packed, and they adhere very well to the transparent oxide (TCO) substrate [6]. These compact layers have been studied as contacting layers in double-layer TiO2 structures for DSSC since improvement of electron extraction at the TiO2–TCO interface is expected [7]. Here we compare devices incorporating a single mesoporous nanocrystalline TiO2 structure with devices based on a double structure in which a MW-CBD film is situated between the TCO and the mesoporous nanocrystalline TiO2 layer. Besides improving electron extraction, this film could also help to block recombination of electrons transferred to the TCO with oxidized species in the electrolyte, as has been reported in the case of DSSC for compact TiO2 films obtained by other deposition tech-niques [8,9]. The two types of UV-selective sensors were characterized in detail. The current voltage characteristics, spectral response, inten-sity dependence of short circuit current and response times were measured and analyzed in order to evaluate the potential of sealed mesoporous TiO2-based photoelectrochemical cells (PEC) as low cost personal UV-photodetectors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: This paper provides a selective annotated bibliography that summarises journal articles which have employed either the theory of reasoned action or the theory of planned behaviour to circumstances which are relevant to business activities. Design/methodology/approach: Searches were conducted on the EBSCO Host and ProQuest databases to identify papers that had used either the theory of reasoned action or theory of planned behaviour in their methodology. The bibliography was separated into three categories- financial decision making, strategic decision making, and professional decision making. Implications: The information presented in this paper is intended to assist and facilitate further research by broadening the awareness of the literature and providing examples of the application of the theory as it has been employed in prior research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Gold nanoparticles supported on CeO2 were found to be efficient photocatalysts for three selective reductions of organic compounds at ambient temperatures, under irradiation of visible light; their reduction ability can be tuned by manipulating the irradiation wavelength.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With new photocatalysts of gold nanoparticles supported on zeolite supports (Au/zeolite), oxidation of benzyl alcohol and its derivatives into the corresponding aldehydes can proceed well with a high selectivity (99%) under visible light irradiation at ambient temperature. Au/zeolite photocatalysts were characterized by UV/Vis, XPS, TEM, XRD, EDS, BET, IR, and Raman techniques. The Surface Plasmon Resonance (SPR) effect of gold nanoparticles, the adsorption capability of zeolite supports, and the molecular polarities of aromatic alcohols were demonstrated to have an essential correlation with the photocatalytic performances. In addition, the effects of light intensity, wavelength range, and the role of molecular oxygen were investigated in detail. The kinetic study indicated that the visible light irradiation required much less apparent activation energy for photooxidation compared with thermal reaction. Based on the characterization data and the photocatalytic performances, we proposed a possible photooxidation mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

EMR (Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One methodology is to link the non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial departments and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plan-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) - DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some techniques like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The encryption method is a well established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data. In this paper we review the conventional encryption method which can be partially queried and propose the encryption method for numerical data which can be effectively queried. The proposed system includes the design of the service scenario, and metadata.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electronic Health Record (EHR) retrieval processes are complex demanding Information Technology (IT) resources exponentially in particular memory usage. Database-as-a-service (DAS) model approach is proposed to meet the scalability factor of EHR retrieval processes. A simulation study using ranged of EHR records with DAS model was presented. The bucket-indexing model incorporated partitioning fields and bloom filters in a Singleton design pattern were used to implement custom database encryption system. It effectively provided faster responses in the range query compared to different types of queries used such as aggregation queries among the DAS, built-in encryption and the plain-text DBMS. The study also presented with constraints around the approach should consider for other practical applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Timed-release cryptography addresses the problem of “sending messages into the future”: information is encrypted so that it can only be decrypted after a certain amount of time, either (a) with the help of a trusted third party time server, or (b) after a party performs the required number of sequential operations. We generalise the latter case to what we call effort-release public key encryption (ER-PKE), where only the party holding the private key corresponding to the public key can decrypt, and only after performing a certain amount of computation which may or may not be parallelisable. Effort-release PKE generalises both the sequential-operation-based timed-release encryption of Rivest, Shamir, and Wagner, and also the encapsulated key escrow techniques of Bellare and Goldwasser. We give a generic construction for ER-PKE based on the use of moderately hard computational problems called puzzles. Our approach extends the KEM/DEM framework for public key encryption by introducing a difficulty notion for KEMs which results in effort-release PKE. When the puzzle used in our generic construction is non-parallelisable, we recover timed-release cryptography, with the addition that only the designated receiver (in the public key setting) can decrypt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate encryption setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We formalize the notion of attribute hiding in the presence of revocation and propose an RPE scheme, called AH-RPE, which achieves attribute-hiding under the Decision Linear assumption in the standard model. We then present a stronger privacy notion, termed full hiding, which further cares about privacy of revoked users. We propose another RPE scheme, called FH-RPE, that adopts the Subset Cover Framework and offers full hiding under the Decision Linear assumption in the standard model. The scheme offers very flexible privacy-preserving access control to encrypted data and can be used in sender-local revocation scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Study Design. Analysis of a case series of 24 Lenke 1C adolescent idiopathic scoliosis (AIS) patients receiving selective thoracoscopic anterior scoliosis correction. Objective. To report the behaviour of the compensatory lumbar curve in a group of Lenke IC AIS patients following thoracoscopic anterior scoliosis correction, and to compare the results of this study with previously published data. Summary of Background Data. Several prior studies have reported spontaneous lumbar curve correction for both anterior and posterior selective fusion in Lenke 1C/King-Moe II patients; however to our knowledge no previous studies have reported outcomes of thoracoscopic anterior correction for this curve type. Methods. All AIS patients with a curve classification of Lenke 1C and a minimum of 24 months follow-up were retrieved from a consecutive series of 190 AIS patients who underwent thoracoscopic anterior instrumented fusion. Cobb angles of the major curve, instrumented levels, compensatory lumbar curve, and T5-T12 kyphosis were recorded, as well as coronal spinal balance, T1 tilt angle and shoulder balance. All radiographic parameters were measured before surgery and at 2, 6, 12 and 24 months after surgery. Results. Twenty-four female patients with right thoracic curves had a mean thoracic Cobb angle of 53.0° before surgery, decreasing to 24.9° two years after surgery. The mean lumbar compensatory Cobb angle was 43.5° before surgery, spontaneously correcting to 25.4° two years after surgery, indicating balance between the thoracic and lumbar scoliotic curves. The lumbar correction achieved (41.8%) compares favourably to previous studies. Conclusions. Selective thoracoscopic anterior fusion allows spontaneous lumbar curve correction and achieves coronal balance of main thoracic and compensatory lumbar curves, good cosmesis and patient satisfaction. Correction and balance are maintained 24 months after surgery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is very difficult to selectively oxidise stable compounds such as toluene and xylenes to useful chemicals with molecular oxygen (O 2) under moderate conditions. To achieve high conversion and less over-oxidised products, a new class of photocatalysts, metal hydroxide nanoparticles grafted with alcohols, is devised. They can efficiently oxidise alkyl aromatic compounds with O 2 using visible or ultraviolet light or even sunlight to generate the corresponding aldehydes, alcohols and acids at ambient temperatures and give very little over-oxidation. For example toluene can be oxidised with a 23% conversion after a 48-hour exposure to sunlight with 85% of the product being benzaldehyde, and only a trace of CO 2.The surface complexes grafted onto metal hydroxides can absorb light, generating free radicals on the surface, which then initiate aerobic oxidation of the stable alkyl aromatic molecules with high product selectivity. This mechanism is distinctly different from those of any known catalysts. The use of the new photocatalysts as a controlled means to generate surface radicals through light excitation allows us to drive the production of fine organic chemicals at ambient temperatures with sunlight. The process with the new photocatalysts is especially valuable for temperature-sensitive syntheses and a greener process than many conventional thermal reactions. © 2012 The Royal Society of Chemistry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.