922 resultados para secure interoperation
Resumo:
Abstract: Australia’s ecosystems are the basis of our current and future prosperity, and our national well-being.A strong and sustainable Australian ecosystem science enterprise is vital for understanding and securing these ecosystems in the face of current and future challenges. This Plan defines the vision and key directions for a national ecosystem science capability that will enable Australia to understand and effectively manage its ecosystems for decades to come.The Plan’s underlying theme is that excellent science supports a range of activities, including public engagement, that enable us to understand and maintain healthy ecosystems.Those healthy ecosystems are the cornerstone of our social and economic well-being.The vision guiding the development of this Plan is that in 20 years’ time the status of Australian ecosystems and how they change will be widely reported and understood, and the prosperity and well-being they provide will be secure. To enable this, Australia’s national ecosystem science capability will be coordinated, collaborative and connected.The Plan is based on an extensive set of collaboratively generated proposals from national town hall meetings that also formthe basis for its implementation. Some directions within the Plan are for the Australian ecosystem science community itself to implement, others will involve the users of ecosystem science and the groups that fund ecosystem science.We identify six equal priority areas for action to achieve our vision: (i) delivering maximum impact for Australia: enhancing relationships between scientists and end-users; (ii) supporting long-termresearch; (iii) enabling ecosystem surveillance; (iv) making the most of data resources; (v) inspiring a generation: empowering the public with knowledge and opportunities; (vi) facilitating coordination, collaboration and leadership. This shared vision will enable us to consolidate our current successes, overcome remaining barriers and establish the foundations to ensure Australian ecosystem science delivers for the future needs of Australia..
Resumo:
Presented in concept at the ACUADS 2008 conference, this paper reports on a research study conducted for PhD into how artistic researchers have been accommodated in the Australian university research management system, and the impacts experienced by artistic researchers through this location. It draws upon a wide range of data to provide the first analysis of this topic reported across all artistic disciplines in Australia in relation to university experiences and updates the Strand Report in 1998 in relation to government policy. Data sources include a correlation of literature from arts disciplines with that of higher education management and government policies; survey responses from of heads of academic units containing artistic researchers in over 40% of Australian universities; interviews with 27 artistic researchers in three case study universities; and interviews with longstanding expert commentators on artistic research and Deputy Vice Chancellors responsible for research. The study suggests that while limited progress has been made towards the acceptance of artistic research as an equivalent and legitimate research endeavour, significant structural, cultural and practical challenges remain which are undermining relationships between universities and their artistic staff and engendering behavioural changes within artistic practitioners that can affect the nature and quality of artistic work that is produced. Reflecting the voices of artistic researchers across the broad visual and performing arts disciplinary spectrum from early to senior career academics, it explores ways forward for universities, and artistic researchers themselves, to secure greater equity and recognition for artistic research.
Resumo:
Parent–subsidiary relationships are commonplace nowadays, yet surprisingly there is a paucity of research analysing their dynamics over time. This paper presents a (longitudinal) case study, illuminating the dynamics implicated when a UK chemicals company imposed its systems and rules on a new subsidiary. Drawing on observations from a longitudinal case study (from 1993 to 2001), the study considers: (1) the extent to which a parent imposes its (management accounting) systems,rules and procedures on a subsidiary; (2) the role which (local) political, cultural and institutional factors in a subsidiary play in shaping the dynamics of such change implementation; (3) how new systems and practices become accepted and take root as values and beliefs and how they supplement earlier norms? The study provides insight for the questions above, and draws on institutional theories and a power mobilisation framework to assist in the interpretation of observations. We find that the operations of the subsidiary company are influenced by inter-related forces, both inside and outside the organisation encompassing issues of power, politics and culture. As such, existing institutions in a subsidiary organisation are influenced, sustained, and changed by the socio-economic context in which the subsidiary is located. Organisational practices designed to secure external legitimacy are not however always symbolic and decoupled from internal operations
Resumo:
The focus in this article is how the extensive use of fly-in fly-out (FIFO) working arrangements in the Western Australian resources sector has an impact directly and indirectly on smaller firms and their ability to recruit workers in remote locations. We argue that the growth of FIFO working arrangements has disadvantaged smaller resource-sector firms by increasing their employment costs and decreasing their ability to attract skilled workers. As a result, smaller resource-sector firms are recruiting skilled workers on 457 visas to secure their business stability and growth, despite the complexity, costs, and risks involved.
Resumo:
This paper describes experiences with the use of the Globus toolkit and related technologies for development of a secure portal that allows nationally-distributed Australian researchers to share data and application programs. The portal allows researchers to access infrastructure that will be used to enhance understanding of the causes of schizophrenia and advance its treatment, and aims to provide access to a resource that can expand into the world’s largest on-line collaborative mental health research facility. Since access to patient data is controlled by local ethics approvals, the portal must transparently both provide and deny access to patient data in accordance with the fine-grained access permissions afforded individual researchers. Interestingly, the access protocols are able to provide researchers with hints about currently inaccessible data that may be of interest to them, providing them the impetus to gain further access permissions.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.
Resumo:
Background and Purpose: - This paper focuses on the learning culture within the high performance levels of rowing. In doing so, we explore the case of an individual’s learning as he moves across athletic, coaching and administrative functions. This exploration draws on a cultural learning framework and complementary theorisings related to reflexivity. Method - This study makes use of an intellectually, morally and collaboratively challenging approach whereby one member of the research team was also the sole participant of this study. The participant’s careers as a high performance athlete, coach and administrator, coupled with his experience in conducting empirical research presented a rare opportunity to engage in collaborative research (involving degrees of insider and outsider status for each of the research team). We acknowledge that others have looked to combine roles of coach / athlete / administrator with that of researcher however few (if any) have attempted to combine them all in one project. Moreover, coupled with the approach to reflexivity adopted in this study and the authorship contributions we consider this scholarly direction uncommon. Data were comprised of recorded research conversations, a subsequently constructed learning narrative, reflections on the narrative, a stimulated reflective piece from the participant, and a final (re)construction of the participant’s story. Accordingly, data were integrated through an iterative process of thematic analysis. Results - The cultural (i.e., the ways things get done) and structural (e.g., the rules and regulations) properties of high performance rowing were found to shape both the opportunities to be present (e.g., secure a place in the crew) and to learn (e.g., learn the skills required to perform at an Olympic level). However, the individual’s personal properties were brought to bear on re-shaping the constraints such that many limitations could be overcome. In keeping with the theory of learning cultures, the culture of rowing was found to position individuals (a coxswain in this case) differentially. In a similar manner, a range of structural features was found to be important in shaping the cultural and personal elements in performance contexts. For example, the ‘field of play’ was found to be important as a structural feature (i.e., inability of coach to communicate with athletes) in shaping the cultural and personal elements of learning in competition (e.g., positioning the coxswain as an in-boat coach and trusted crewmate). Finally, the cultural and structural elements in rowing appeared to be activated by the participant’s personal elements, most notably his orientation towards quality performance. Conclusion - The participant in this study was found to be driven by the project that he cares about most and at each turn he has bent his understanding of his sport back on itself to see if he can find opportunities to learn and subsequently explore ways to improve performance. The story here emphasises the importance of learner agency, and this is an aspect that has often been missing in recent theorising about learning. In this study, we find an agent using his ‘personal emergent powers to activate the resources in the culture and structure of his sport in an attempt to improve performance. We conclude from this account that this particular high performance rowing culture is one that provided support but nonetheless encouraged those involved, to ‘figure things out’ for themselves – be it as athletes, coaches and/or administrators.
Resumo:
The Grøstl Hash Function Grøstl is FAST Grøstl is PROVABLY SECURE Grøstl is SIDE-CHANNEL RESISTANT Grøstl is SIMPLE
Resumo:
The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.
Resumo:
Background Despite the widely recognised importance of sustainable health care systems, health services research remains generally underfunded in Australia. The Australian Centre for Health Services Innovation (AusHSI) is funding health services research in the state of Queensland. AusHSI has developed a streamlined protocol for applying and awarding funding using a short proposal and accelerated peer review. Method An observational study of proposals for four health services research funding rounds from May 2012 to November 2013. A short proposal of less than 1,200 words was submitted using a secure web-based portal. The primary outcome measures are: time spent preparing proposals; a simplified scoring of grant proposals (reject, revise or accept for interview) by a scientific review committee; and progressing from submission to funding outcomes within eight weeks. Proposals outside of health services research were deemed ineligible. Results There were 228 eligible proposals across 4 funding rounds: from 29% to 79% were shortlisted and 9% to 32% were accepted for interview. Success rates increased from 6% (in 2012) to 16% (in 2013) of eligible proposals. Applicants were notified of the outcomes within two weeks from the interview; which was a maximum of eight weeks after the submission deadline. Applicants spent 7 days on average preparing their proposal. Applicants with a ranking of reject or revise received written feedback and suggested improvements for their proposals, and resubmissions composed one third of the 2013 rounds. Conclusions The AusHSI funding scheme is a streamlined application process that has simplified the process of allocating health services research funding for both applicants and peer reviewers. The AusHSI process has minimised the time from submission to notification of funding outcomes.
Resumo:
A staged crime scene involves deliberate alteration of evidence by the offender to simulate events that did not occur for the purpose of misleading authorities (Geberth, 2006; Turvey, 2000). This study examined 115 staged homicides from the USA to determine common elements; victim and perpetrator characteristics; and specific features of different types of staged scenes. General characteristics include: multiple victims and offenders; a previous relationship be- tween parties involved; and victims discovered in their own home, often by the offender. Staged scenes were separated by type with staged burglaries, suicides, accidents, and car accidents examined in more detail. Each type of scene displays differently with separate indicators and common features. Features of staged burglaries were: no points of entry/exit staged; non-valuables taken; scene ransacking; offender self- injury; and offenders bringing weapons to the scene. Features of staged suicides included: weapon arrangement and simulating self-injury to the victim; rearranging the body; and removing valuables. Examples of elements of staged accidents were arranging the implement/weapon and re- positioning the deceased; while staged car accidents involved: transporting the body to the vehicle and arranging both; mutilation after death; attempts to secure an alibi; and clean up at the primary crime scene. The results suggest few staging behaviors are used, despite the credibility they may have offered the façade. This is the first peer-reviewed, published study to examine the specific features of these scenes, and is the largest sample studied to date.
Resumo:
The broad aim of of this thesis is to contribute to understanding how the relationships between culture, employment and education can help Tanzania's young people secure jobs, and survive in the creative workforce so as to better their future. Based on a range of interviews and other data in Tanzania, the study considers how to integrate cultural expressions into arts education (education in art and education through art) as a tool for nurturing young people's creative talents for their future sustainable employment in Tanzania.
Resumo:
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.
Resumo:
In ecosystems driven by water availability, plant community dynamics depend on complex interactions between vegetation, hydrology, and human water resources use. Along ephemeral rivers—where water availability is erratic—vegetation and people are particularly vulnerable to changes in each other's water use. Sensible management requires that water supply be maintained for people, while preserving ecosystem health. Meeting such requirements is challenging because of the unpredictable water availability. We applied information gap decision theory to an ecohydrological system model of the Kuiseb River environment in Namibia. Our aim was to identify the robustness of ecosystem and water management strategies to uncertainties in future flood regimes along ephemeral rivers. We evaluated the trade-offs between alternative performance criteria and their robustness to uncertainty to account for both (i) human demands for water supply and (ii) reducing the risk of species extinction caused by water mining. Increasing uncertainty of flood regime parameters reduced the performance under both objectives. Remarkably, the ecological objective (species coexistence) was more sensitive to uncertainty than the water supply objective. However, within each objective, the relative performance of different management strategies was insensitive to uncertainty. The ‘best’ management strategy was one that is tuned to the competitive species interactions in the Kuiseb environment. It regulates the biomass of the strongest competitor and, thus, at the same time decreases transpiration, thereby increasing groundwater storage and reducing pressure on less dominant species. This robust mutually acceptable strategy enables species persistence without markedly reducing the water supply for humans. This study emphasises the utility of ecohydrological models for resource management of water-controlled ecosystems. Although trade-offs were identified between alternative performance criteria and their robustness to uncertain future flood regimes, management strategies were identified that help to secure an ecologically sustainable water supply.