832 resultados para role based access control
Resumo:
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate encryption setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We formalize the notion of attribute hiding in the presence of revocation and propose an RPE scheme, called AH-RPE, which achieves attribute-hiding under the Decision Linear assumption in the standard model. We then present a stronger privacy notion, termed full hiding, which further cares about privacy of revoked users. We propose another RPE scheme, called FH-RPE, that adopts the Subset Cover Framework and offers full hiding under the Decision Linear assumption in the standard model. The scheme offers very flexible privacy-preserving access control to encrypted data and can be used in sender-local revocation scenarios.
Resumo:
The somatosensory system plays an important role in balance control and age-related changes to this system have been implicated in falls. Parkinson’s disease (PD) is a chronic and progressive disease of the brain, characterized by postural instability and gait disturbance. Previous research has shown that deficiencies in somatosensory feedback may contribute to the poorer postural control demonstrated by PD individuals. However, few studies have comprehensively explored differences in somatosensory function and postural control between PD participants and healthy older individuals. The soles of the feet contain many cutaneous mechanoreceptors that provide important somatosensory information sources for postural control. Different types of insole devices have been developed to enhance this somatosensory information and improve postural stability, but these devices are often too complex and expensive to integrate into daily life. Textured insoles provide a more passive intervention that may be an inexpensive and accessible means to enhance the somatosensory input from the plantar surface of the feet. However, to date, there has been little work conducted to test the efficacy of enhanced somatosensory input induced by textured insoles in both healthy and PD populations during standing and walking. Therefore, the aims of this thesis were to determine: 1) whether textured insole surfaces can improve postural stability by enhancing somatosensory information in younger and older adults, 2) the differences between healthy older participants and PD participants for measures of physiological function and postural stability during standing and walking, 3) how changes in somatosensory information affect postural stability in both groups during standing and walking; and 4), whether textured insoles can improve postural stability in both groups during standing and walking. To address these aims, Study 1 recruited seven older individuals and ten healthy young controls to investigate the effects of two textured insole surfaces on postural stability while performing standing balance tests on a force plate. Participants were tested under three insole surface conditions: 1) barefoot; 2) standing on a hard textured insole surface; and 3), standing on a soft textured insole surface. Measurements derived from the centre of pressure displacement included the range of anterior-posterior and medial-lateral displacement, path length and the 90% confidence elliptical area (C90 area). Results of study 1 revealed a significant Group*Surface*Insole interaction for the four measures. Both textured insole surfaces reduced postural sway for the older group, especially in the eyes closed condition on the foam surface. However, participants reported that the soft textured insole surface was more comfortable and, hence, the soft textured insoles were adopted for Studies 2 and 3. For Study 2, 20 healthy older adults (controls) and 20 participants with Parkinson’s disease were recruited. Participants were evaluated using a series of physiological assessments that included touch sensitivity, vibratory perception, and pain and temperature threshold detection. Furthermore, nerve function and somatosensory evoked potentials tests were utilized to provide detailed information regarding peripheral nerve function for these participants. Standing balance and walking were assessed on different surfaces using a force plate and the 3D Vicon motion analysis system, respectively. Data derived from the force plate included the range of anterior-posterior and medial-lateral sway, while measures of stride length, stride period, cadence, double support time, stance phase, velocity and stride timing variability were reported for the walking assessment. The results of this study demonstrated that the PD group had decrements in somatosensory function compared to the healthy older control group. For electrodiagnosis, PD participants had poorer nerve function than controls, as evidenced by slower nerve conduction velocities and longer latencies in sural nerve and prolonged latency in the P37 somatosensory evoked potential. Furthermore, the PD group displayed more postural sway in both the anterior-posterior and medial-lateral directions relative to controls and these differences were increased when standing on a foam surface. With respect to the gait assessment, the PD group took shorter strides and had a reduced stride period compared with the control group. Furthermore, the PD group spent more time in the stance phase and had increased cadence and stride timing variability than the controls. Compared with walking on the firm surface, the two groups demonstrated different gait adaptations while walking on the uneven surface. Controls increased their stride length and stride period and decreased their cadence, which resulted in a consistent walking velocity on both surfaces. Conversely, while the PD patients also increased their stride period and decreased their cadence and stance period on the uneven surface, they did not increase their stride length and, hence walked slower on the uneven surface. In the PD group, there was a strong positive association between decreased somatosensory function and decreased clinical balance, as assessed by the Tinetti test. Poorer somatosensory function was also strongly positively correlated with the temporospatial gait parameters, especially shorter stride length. Study 3 evaluated the effects of manipulating the somatosensory information from the plantar surface of the feet using textured insoles in the same populations assessed in Study 2. For this study, participants performed the standing and walking balance tests under three footwear conditions: 1) barefoot; 2) with smooth insoles; and 3), with textured insoles. Standing balance and walking were evaluated using a force plate and a Vicon motion analysis system and the data were analysed in the same way outlined for Study 2. The findings showed that the smooth and textured insoles caused different effects on postural control during both the standing and walking trials. Both insoles decreased medial-lateral sway to the same level on the firm surface. The greatest benefits were observed in the PD group while wearing the textured insole. When standing under a more challenging condition on the foam surface with eyes closed, only the textured insole decreased medial-lateral sway in the PD group. With respect to the gait trials, both insoles increased walking velocity, stride length and stride time and decreased cadence, but these changes were more pronounced for the textured insoles. The effects of the textured insoles were evident under challenging conditions in the PD group and increased walking velocity and stride length, while decreasing cadence. Textured insoles were also effective in reducing the time spent in the double support and stance phases of the gait cycle and did not increase stride timing variability, as was the case for the smooth insoles for the PD group. The results of this study suggest that textured insoles, such as those evaluated in this research, may provide a low-cost means of improving postural stability in high-risk groups, such as people with PD, which may act as an important intervention to prevent falls.
Resumo:
A building information model (BIM) is an electronic repository of structured, three-dimensional data that captures both the physical and dynamic functional characteristics of a facility. In addition to its more traditional function as a tool to aid design and construction, a BIM can be used throughout the life cycle of a facility, functioning as a living database that places resources contained within the building in their spatial and temporal context. Through its comprehension of spatial relationships, a BIM can meaningfully represent and integrate previously isolated control and management systems and processes, and thereby provide a more intuitive interface to users. By placing processes in a spatial context, decision-making can be improved, with positive flow-on effects for security and efficiency. In this article, we systematically analyse the authorization requirements involved in the use of BIMs. We introduce the concept of using a BIM as a graphical tool to support spatial access control configuration and management (including physical access control). We also consider authorization requirements for regulating access to the structured data that exists within a BIM as well as to external systems and data repositories that can be accessed via the BIM interface. With a view to addressing these requirements we present a survey of relevant spatiotemporal access control models, focusing on features applicable to BIMs and highlighting capability gaps. Finally, we present a conceptual authorization framework that utilizes BIMs.
Resumo:
Exponential growth of genomic data in the last two decades has made manual analyses impractical for all but trial studies. As genomic analyses have become more sophisticated, and move toward comparisons across large datasets, computational approaches have become essential. One of the most important biological questions is to understand the mechanisms underlying gene regulation. Genetic regulation is commonly investigated and modelled through the use of transcriptional regulatory network (TRN) structures. These model the regulatory interactions between two key components: transcription factors (TFs) and the target genes (TGs) they regulate. Transcriptional regulatory networks have proven to be invaluable scientific tools in Bioinformatics. When used in conjunction with comparative genomics, they have provided substantial insights into the evolution of regulatory interactions. Current approaches to regulatory network inference, however, omit two additional key entities: promoters and transcription factor binding sites (TFBSs). In this study, we attempted to explore the relationships among these regulatory components in bacteria. Our primary goal was to identify relationships that can assist in reducing the high false positive rates associated with transcription factor binding site predictions and thereupon enhance the reliability of the inferred transcription regulatory networks. In our preliminary exploration of relationships between the key regulatory components in Escherichia coli transcription, we discovered a number of potentially useful features. The combination of location score and sequence dissimilarity scores increased de novo binding site prediction accuracy by 13.6%. Another important observation made was with regards to the relationship between transcription factors grouped by their regulatory role and corresponding promoter strength. Our study of E.coli ��70 promoters, found support at the 0.1 significance level for our hypothesis | that weak promoters are preferentially associated with activator binding sites to enhance gene expression, whilst strong promoters have more repressor binding sites to repress or inhibit gene transcription. Although the observations were specific to �70, they nevertheless strongly encourage additional investigations when more experimentally confirmed data are available. In our preliminary exploration of relationships between the key regulatory components in E.coli transcription, we discovered a number of potentially useful features { some of which proved successful in reducing the number of false positives when applied to re-evaluate binding site predictions. Of chief interest was the relationship observed between promoter strength and TFs with respect to their regulatory role. Based on the common assumption, where promoter homology positively correlates with transcription rate, we hypothesised that weak promoters would have more transcription factors that enhance gene expression, whilst strong promoters would have more repressor binding sites. The t-tests assessed for E.coli �70 promoters returned a p-value of 0.072, which at 0.1 significance level suggested support for our (alternative) hypothesis; albeit this trend may only be present for promoters where corresponding TFBSs are either all repressors or all activators. Nevertheless, such suggestive results strongly encourage additional investigations when more experimentally confirmed data will become available. Much of the remainder of the thesis concerns a machine learning study of binding site prediction, using the SVM and kernel methods, principally the spectrum kernel. Spectrum kernels have been successfully applied in previous studies of protein classification [91, 92], as well as the related problem of promoter predictions [59], and we have here successfully applied the technique to refining TFBS predictions. The advantages provided by the SVM classifier were best seen in `moderately'-conserved transcription factor binding sites as represented by our E.coli CRP case study. Inclusion of additional position feature attributes further increased accuracy by 9.1% but more notable was the considerable decrease in false positive rate from 0.8 to 0.5 while retaining 0.9 sensitivity. Improved prediction of transcription factor binding sites is in turn extremely valuable in improving inference of regulatory relationships, a problem notoriously prone to false positive predictions. Here, the number of false regulatory interactions inferred using the conventional two-component model was substantially reduced when we integrated de novo transcription factor binding site predictions as an additional criterion for acceptance in a case study of inference in the Fur regulon. This initial work was extended to a comparative study of the iron regulatory system across 20 Yersinia strains. This work revealed interesting, strain-specific difierences, especially between pathogenic and non-pathogenic strains. Such difierences were made clear through interactive visualisations using the TRNDifi software developed as part of this work, and would have remained undetected using conventional methods. This approach led to the nomination of the Yfe iron-uptake system as a candidate for further wet-lab experimentation due to its potential active functionality in non-pathogens and its known participation in full virulence of the bubonic plague strain. Building on this work, we introduced novel structures we have labelled as `regulatory trees', inspired by the phylogenetic tree concept. Instead of using gene or protein sequence similarity, the regulatory trees were constructed based on the number of similar regulatory interactions. While the common phylogentic trees convey information regarding changes in gene repertoire, which we might regard being analogous to `hardware', the regulatory tree informs us of the changes in regulatory circuitry, in some respects analogous to `software'. In this context, we explored the `pan-regulatory network' for the Fur system, the entire set of regulatory interactions found for the Fur transcription factor across a group of genomes. In the pan-regulatory network, emphasis is placed on how the regulatory network for each target genome is inferred from multiple sources instead of a single source, as is the common approach. The benefit of using multiple reference networks, is a more comprehensive survey of the relationships, and increased confidence in the regulatory interactions predicted. In the present study, we distinguish between relationships found across the full set of genomes as the `core-regulatory-set', and interactions found only in a subset of genomes explored as the `sub-regulatory-set'. We found nine Fur target gene clusters present across the four genomes studied, this core set potentially identifying basic regulatory processes essential for survival. Species level difierences are seen at the sub-regulatory-set level; for example the known virulence factors, YbtA and PchR were found in Y.pestis and P.aerguinosa respectively, but were not present in both E.coli and B.subtilis. Such factors and the iron-uptake systems they regulate, are ideal candidates for wet-lab investigation to determine whether or not they are pathogenic specific. In this study, we employed a broad range of approaches to address our goals and assessed these methods using the Fur regulon as our initial case study. We identified a set of promising feature attributes; demonstrated their success in increasing transcription factor binding site prediction specificity while retaining sensitivity, and showed the importance of binding site predictions in enhancing the reliability of regulatory interaction inferences. Most importantly, these outcomes led to the introduction of a range of visualisations and techniques, which are applicable across the entire bacterial spectrum and can be utilised in studies beyond the understanding of transcriptional regulatory networks.
Resumo:
Objective: To establish risk factors for moderate and severe microbial keratitis among daily contact lens (CL) wearers in Australia. Design: A prospective, 12-month, population-based, case-control study. Participants: New cases of moderate and severe microbial keratitis in daily wear CL users presenting in Australia over a 12-month period were identified through surveillance of all ophthalmic practitioners. Case detection was augmented by record audits at major ophthalmic centers. Controls were users of daily wear CLs in the community identified using a national telephone survey. Testing: Cases and controls were interviewed by telephone to determine subject demographics and CL wear history. Multiple binary logistic regression was used to determine independent risk factors and univariate population attributable risk percentage (PAR%) was estimated for each risk factor.; Main Outcome Measures: Independent risk factors, relative risk (with 95% confidence intervals [CIs]), and PAR%. Results: There were 90 eligible moderate and severe cases related to daily wear of CLs reported during the study period. We identified 1090 community controls using daily wear CLs. Independent risk factors for moderate and severe keratitis while adjusting for age, gender, and lens material type included poor storage case hygiene 6.4× (95% CI, 1.9-21.8; PAR, 49%), infrequent storage case replacement 5.4× (95% CI, 1.5-18.9; PAR, 27%), solution type 7.2× (95% CI, 2.3-22.5; PAR, 35%), occasional overnight lens use (<1 night per week) 6.5× (95% CI, 1.3-31.7; PAR, 23%), high socioeconomic status 4.1× (95% CI, 1.2-14.4; PAR, 31%), and smoking 3.7× (95% CI, 1.1-12.8; PAR, 31%). Conclusions: Moderate and severe microbial keratitis associated with daily use of CLs was independently associated with factors likely to cause contamination of CL storage cases (frequency of storage case replacement, hygiene, and solution type). Other factors included occasional overnight use of CLs, smoking, and socioeconomic class. Disease load may be considerably reduced by attention to modifiable risk factors related to CL storage case practice.
Resumo:
Increasing use of computerized systems in our daily lives creates new adversarial opportunities for which complex mechanisms are exploited to mend the rapid development of new attacks. Behavioral Biometrics appear as one of the promising response to these attacks. But it is a relatively new research area, specific frameworks for evaluation and development of behavioral biometrics solutions could not be found yet. In this paper we present a conception of a generic framework and runtime environment which will enable researchers to develop, evaluate and compare their behavioral biometrics solutions with repeatable experiments under the same conditions with the same data.
Resumo:
This thesis is the result of an investigation into information privacy management in eHealth. It explores the applicability of accountability measures as a means of protection of eHealth consumer privacy. The thesis presented a new concept of Accountable eHealth Systems for achieving a balance between the information privacy concerns of eHealth consumers and the information access requirements of healthcare professionals and explored the social, technological and implementation aspects involved in such a system.
Resumo:
The Macroscopic Fundamental Diagram (MFD) relates space-mean density and flow, and the existence with dynamic features was confirmed in congested urban network with real data set from loop detectors and taxi probes. Since the MFD represents the area-wide network traffic performances, it gives foundations for perimeter control strategies and an area traffic state estimation enabling area-based network control. However, limited works have been reported on real world example from signalised arterial network. This paper fuses data from multiple sources (Bluetooth, Loops and Signals) and develops a framework for the development of the MFD for Brisbane. Existence of the MFD in Brisbane network is confirmed. Different MFDs (from whole network and several sub regions) are evaluated to discover the spatial partitioning in network performance representation.
Resumo:
Objectives To investigate the factors associated with sudden infant death syndrome (SIDS) from birth to age 2 years, whether recent advice has been followed, whether any new risk factors have emerged, and the specific circumstances in which SIDS occurs while cosleeping (infant sharing the same bed or sofa with an adult or child). Design Four year population based case-control study. Parents were interviewed shortly after the death or after the reference sleep (within 24 hours) of the two control groups. Setting South west region of England (population 4.9 million, 184 800 births). Participants 80 SIDS infants and two control groups weighted for age and time of reference sleep: 87 randomly selected controls and 82 controls at high risk of SIDS (young, socially deprived, multiparous mothers who smoked). Results The median age at death (66 days) was more than three weeks less than in a study in the same region a decade earlier. Of the SIDS infants, 54% died while cosleeping compared with 20% among both control groups. Much of this excess may be explained by a significant multivariable interaction between cosleeping and recent parental use of alcohol or drugs (31% v 3% random controls) and the increased proportion of SIDS infants who had coslept on a sofa (17% v 1%). One fifth of SIDS infants used a pillow for the last sleep (21% v 3%) and one quarter were swaddled (24% v 6%). More mothers of SIDS infants than random control infants smoked during pregnancy (60% v 14%), whereas one quarter of the SIDS infants were preterm (26% v 5%) or were in fair or poor health for the last sleep (28% v 6%). All of these differences were significant in the multivariable analysis regardless of which control group was used for comparison. The significance of covering the infant’s head, postnatal exposure to tobacco smoke, dummy use, and sleeping in the side position has diminished although a significant proportion of SIDS infants were still found prone (29% v 10%). Conclusions Many of the SIDS infants had coslept in a hazardous environment. The major influences on risk, regardless of markers for socioeconomic deprivation, are amenable to change and specific advice needs to be given, particularly on use of alcohol or drugs before cosleeping and cosleeping on a sofa.
Resumo:
In this paper, we describe a method to represent and discover adversarial group behavior in a continuous domain. In comparison to other types of behavior, adversarial behavior is heavily structured as the location of a player (or agent) is dependent both on their teammates and adversaries, in addition to the tactics or strategies of the team. We present a method which can exploit this relationship through the use of a spatiotemporal basis model. As players constantly change roles during a match, we show that employing a "role-based" representation instead of one based on player "identity" can best exploit the playing structure. As vision-based systems currently do not provide perfect detection/tracking (e.g. missed or false detections), we show that our compact representation can effectively "denoise" erroneous detections as well as enabe temporal analysis, which was previously prohibitive due to the dimensionality of the signal. To evaluate our approach, we used a fully instrumented field-hockey pitch with 8 fixed high-definition (HD) cameras and evaluated our approach on approximately 200,000 frames of data from a state-of-the-art real-time player detector and compare it to manually labelled data.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
The first generation e-passport standard is proven to be insecure and prone to various attacks. To strengthen, the European Union (EU) has proposed an Extended Access Control (EAC) mechanism for e-passports that intends to provide better security in protecting biometric information of the e-passport bearer. But, our analysis shows, the EU proposal fails to address many security and privacy issues that are paramount in implementing a strong security mechanism. In this paper we propose an on-line authentication mechanism for electronic passports that addresses the weakness in existing implementations, of both The International Civil Aviation Organisation (ICAO) and EU. Our proposal utilises ICAO PKI implementation, thus requiring very little modifications to the existing infrastructure which is already well established.
Resumo:
This paper provides a preliminary analysis of an autonomous uncooperative collision avoidance strategy for unmanned aircraft using image-based visual control. Assuming target detection, the approach consists of three parts. First, a novel decision strategy is used to determine appropriate reference image features to track for safe avoidance. This is achieved by considering the current rules of the air (regulations), the properties of spiral motion and the expected visual tracking errors. Second, a spherical visual predictive control (VPC) scheme is used to guide the aircraft along a safe spiral-like trajectory about the object. Lastly, a stopping decision based on thresholding a cost function is used to determine when to stop the avoidance behaviour. The approach does not require estimation of range or time to collision, and instead relies on tuning two mutually exclusive decision thresholds to ensure satisfactory performance.
Resumo:
This tutorial primarily focuses on the technical challenges surrounding the design and implementation of Accountable-eHealth (AeH) systems. The potential benefits of shared eHealth records systems are promising for the future of improved healthcare; however, their uptake is hindered by concerns over the privacy and security of patient information. In the current eHealth environment, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well informed decisions. This conflict is evident in the review of Australia's PCEHR system. Accountable-eHealth systems aim to balance these concerns by implementing Information Accountability (IA) mechanisms. AeH systems create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency, thus, enabling the creation of shared eHealth records that can be useful to both patients and HCPs. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of AeH systems and the solutions we have devised. A prototype AeH system will be used to demonstrate the functionality of AeH systems, and illustrate some of the proposed solutions. The topics that will be covered include: designing for usability in AeH systems, the privacy and security of audit mechanisms, providing for diversity of users, the scalability of AeH systems, and finally the challenges of enabling research and Big Data Analytics on shared eHealth Records while ensuring accountability and privacy are maintained.
Resumo:
Although the collection of player and ball tracking data is fast becoming the norm in professional sports, large-scale mining of such spatiotemporal data has yet to surface. In this paper, given an entire season's worth of player and ball tracking data from a professional soccer league (approx 400,000,000 data points), we present a method which can conduct both individual player and team analysis. Due to the dynamic, continuous and multi-player nature of team sports like soccer, a major issue is aligning player positions over time. We present a "role-based" representation that dynamically updates each player's relative role at each frame and demonstrate how this captures the short-term context to enable both individual player and team analysis. We discover role directly from data by utilizing a minimum entropy data partitioning method and show how this can be used to accurately detect and visualize formations, as well as analyze individual player behavior.