785 resultados para Governance of security


Relevância:

80.00% 80.00%

Publicador:

Resumo:

We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A number of security models have been proposed for RFID systems. Recent studies show that current models tend to be limited in the number of properties they capture. Consequently, models are commonly unable to distinguish between protocols with regard to finer privacy properties. This paper proposes a privacy model that introduces previously unavailable expressions of privacy. Based on the well-studied notion of indistinguishability, the model also strives to be simpler, easier to use, and more intuitive compared to previous models.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A number of security models have been proposed for RFID systems. Recent studies show that current models tend to be limited in the number of properties they capture. Consequently, models are commonly unable to distinguish between protocols with regard to finer privacy properties. This paper proposes a privacy model that introduces previously unavailable expressions of privacy. Based on the well-studied notion of indistinguishability, the model also strives to be simpler, easier to use, and more intuitive compared to previous models.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

All civil and private aircraft are required to comply with the airworthiness standards set by their national airworthiness authority and throughout their operational life must be in a condition of safe operation. Aviation accident data shows that over 20% of all fatal accidents in aviation are due to airworthiness issues, specifically aircraft mechanical failures. Ultimately it is the responsibility of each registered operator to ensure that their aircraft remain in a condition of safe operation, and this is done through both effective management of airworthiness activities and the effective programme governance of safety outcomes. Typically, the projects within these airworthiness management programmes are focused on acquiring, modifying and maintaining the aircraft as a capability supporting the business. Programme governance provides the structure through which the goals and objectives of airworthiness programmes are set along with the means of attaining them. Whilst the principal causes of failures in many programmes can be traced to inadequate programme governance, many of the failures in large-scale projects can have their root causes in the organizational culture and more specifically in the organizational processes related to decision-making. This paper examines the primary theme of project and programme-based enterprises, and introduces a model for measuring organizational culture in airworthiness management programmes using measures drawn from 211 respondents in Australian airline programmes. The paper describes the theoretical perspectives applied to modifying an original model to specifically focus it on measuring the organizational culture of programmes for managing airworthiness; identifying the most important factors needed to explain the relationship between the measures collected, and providing a description of the nature of these factors. The paper concludes by identifying a model that best describes the organizational culture data collected from seven airworthiness management programmes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Energy represents the cornerstone of modern life. However, current patterns of energy production are unsustainable. This is true for both the developed and developing worlds. In this context, this paper considers how, from a conceptual perspective, the law can contribute to more sustainable patterns of energy production can be addressed. The approach that this paper adopts is to consider two of the most important concepts that are relevant to the governance of modern environmental and societal challenges: human dignity and sustainable development. It is within this context that this paper contends that the convergence of these concepts provides the platform for a novel approach to encourage the sustainable production of energy by way of a ‘right to sustainable energy’. With this in mind, this paper considers the forum in which a right to sustainable energy may be developed and outlines the content of the proposed right.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Sundarbans, a Ramsar and World Heritage site, is the largest single block of tidal halophytic mangrove forest in the world covering parts of Bangladesh and India. Natural mangroves were very common along the entire coast of Bangladesh. However, all other natural mangrove forests, including the Chakaria Sundarbans with 21,000 hectares of mangrove, have been cleared for shrimp cultivation. Against this backdrop, the Forest Department of Bangladesh has developed project design documents for a project called ‘Collaborative REDD+ Improved Forest Management (IFM) Sundarbans Project’ (CRISP) to save the only remaining natural mangrove forest of the country. This project, involving conservation of 412,000 ha of natural mangrove forests, is expected to generate, over a 30-year period, a total emissions reduction of about 6.4 million tons of CO2. However, the successful implementation of this project involves a number of critical legal and institutional issues. It may involve complex legal issues such as forest ownership, forest use rights, rights of local people and carbon rights. It may also involve institutional reforms. Ensuring good governance of the proposed project is very vital considering the failure of the Asian Development Bank (ADB) funded and Bangladesh Forest Department managed ‘Sundarbans Biodiversity Conservation Project’. Considering this previous experience, this paper suggests that a comprehensive legal and institutional review and reform is needed for the successful implementation of the proposed CRISP project. This paper argues that without ensuring local people’s rights and their participation, no project can be successful in the Sundarbans. Moreover, corruption of local and international officials may be a serious hurdle in the successful implementation of the project.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Sundarbans, a Ramsar and World Heritage site, is the largest single block of tidal halophytic mangrove forest in the world covering parts of Bangladesh and India. Natural mangroves were very common along the entire coast of Bangladesh. However, all other natural mangrove forests, including the Chakaria Sundarbans with 21,000 hectares of mangrove, have been cleared for shrimp cultivation. Against this backdrop, the Forest Department of Bangladesh has developed project design documents for a project called ‘Collaborative REDD+ Improved Forest Management (IFM) Sundarbans Project’ (CRISP) to save the only remaining natural mangrove forest of the country. This project, involving conservation of 412,000 ha of natural mangrove forests, is expected to generate, over a 30-year period, a total emissions reduction of about 6.4 million tons of CO2. However, the successful implementation of this project involves a number of critical legal and institutional issues. It may involve complex legal issues such as forest ownership, forest use rights, rights of local people and carbon rights. It may also involve institutional reforms. Ensuring good governance of the proposed project is very vital considering the failure of the Asian Development Bank (ADB) funded and Bangladesh Forest Department managed ‘Sundarbans Biodiversity Conservation Project’. Considering this previous experience, this paper suggests that a comprehensive legal and institutional review and reform is needed for the successful implementation of the proposed CRISP project. This paper argues that without ensuring local people’s rights and their participation, no project can be successful in the Sundarbans. Moreover, corruption of local and international officials may be a serious hurdle in the successful implementation of the project.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since the nineteenth century, drug use has been variously understood as a problem of epidemiology, psychiatry, physiology, and criminality. Consequently drug research tends to be underpinned by assumptions of inevitable harm, and is often directed towards preventing drug use or solving problems. These constructions of the drug problem have generated a range of law enforcement responses, drug treatment technologies and rehabilitative programs that are intended to prevent drug related harm and resituate drug users in the realm of neo-liberal functional citizenship. This paper is based on empirical research of young people’s illicit drug use in Brisbane. The research rejects the idea of a pre-given drug problem, and seeks to understand how drugs have come to be defined as a problem. Using Michel Foucault’s conceptual framework of governmentality, the paper explores how the governance of illicit drugs, through law, public health and medicine, intersects with self-governance to shape young people’s drug use practices. It is argued that constructions of the drug problem shape what drug users believe about themselves and the ways in which they use drugs. From this perspective, drug use practices are ‘practices of the self’, formed through an interaction of the government of illicit drugs and the drug users own subjectivity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to various regulations that require data and operations to reside in specific geographic locations. Thus, cloud users may want to be sure that their stored data have not been relocated into unknown geographic regions that may compromise the security of their stored data. Albeshri et al. (2012) combined proof of storage (POS) protocols with distance-bounding protocols to address this problem. However, their scheme involves unnecessary delay when utilising typical POS schemes due to computational overhead at the server side. The aim of this paper is to improve the basic GeoProof protocol by reducing the computation overhead at the server side. We show how this can maintain the same level of security while achieving more accurate geographic assurance.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This article proposes that a paradigm shift that has implications for practitioners of parenting interventions is emerging. This shift represents a challenge to the dominant model of parent training. The Triple P Parenting Program is discussed as an example of parent training programme to highlight the relevant issues for practitioners, including common practitioner objections encountered in dissemination as identified, in part, by Mazzucchelli and Sanders. It is argued that apart fromthese objections, there are more essential concerns in relation to the adoption of parent training programmes by practitioners. Rather, the article argues that parent training is “mind-blind” and that approaches emerging from the field of interpersonal neurobiology represent developmentally sophisticated alternatives for intervention. The Circle of Security programme is discussed as one example of this emerging paradigm shift that integrates attachment, social neuroscience, and psychodynamic theory. Contrasts are highlighted between the models, and considerations for future issues in parent intervention conclude the article.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Widespread scholarly interest in ethics in research with children, as an extant field of inquiry and practice, is a relatively new phenomenon. The discipline of ethics can be traced back to the Hippocratic school, but its contemporary applications in the everyday worlds of children and those around them are gaining greater attention from theorists, practitioners, and those involved in policy. Heightened international awareness of the United Nations Convention on the Rights of the Child (1979) gave significant impetus to increasing international awareness of children’s rights to provision, protection, and participation in everyday contexts, including those in which research occurs. Understandings of research ethics and of children’s involvement in research relate to broader understandings of children and childhood drawn from developmental science, sociology, human geography, health sciences, and children’s human rights to participation and protection. Key understandings pertain to children’s competence to participate in research, to operate as reliable informants with respect to their own lives, to provide voluntary informed consent and dissent in research, and to make meaningful decisions about the nature and extent of their participation. The field is international and interdisciplinary, although bounded by legislative, policy, and jurisdictional requirements governing research—its conduct and dissemination. So, too, the burgeoning work of ethics committees, whether in relation to health research or social research, is evidence of a sharpened focus on governance of child research. Oxford Bibliographies offers a suite of perspectives, resources, and strategies to guide the researcher, practitioner, and policymaker and serves to challenge readers to interrogate conceptual understandings, methodologies, and dissemination of research with and about children. Exploration of the suite opens up new possibilities for considering children’s rights to participation in matters that affect their lives and for children to be seen and heard in research.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

“Food literacy” is an emerging term used to describe the relative ability to understand the nature of food and how it is important. It also describes the ability to gather, process, analyse and act upon information about food and to apply it in individual settings. A Delphi study of 43 Australian food experts from diverse sectors and settings in all states and territories explored the meaning of food literacy, its constitutive components and how they relate to nutrition. The three-round Delphi began with a semi-structured telephone interview and was followed by two online surveys. Grounded theory was used to develop a conceptual model of the relationship between food literacy and nutrition. It is proposed that food literacy influences nutrition through three related mechanisms of security, choice and pleasure. These mechanisms will be mediated by the local food supply and individual values. The relative importance of components of food literacy will depend upon these mediators. The level of nutrition outcome being sought (for example, dietary guidelines versus food group serves) will also influence the relative importance of these components. This model will be useful in informing program planning and evaluation and will be tested and refined following a phenomenological study of consumers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In recent decades, the governance of food safety, food quality, on-farm environmental management and animal welfare has been shifting from the realm of 'the government' to that of the private sector. Corporate entities, especially the large supermarkets, have responded to neoliberal forms of governance and the resultant 'hollowed-out' state by instituting private standards for food, backed by processes of certification and policed through systems of third party auditing. Today's food regime is one in which supermarkets impose 'private standards' along the food supply chain to ensure compliance with a range of food safety goals-often above and beyond those prescribed by government. By examining regulatory governance in Australia, Norway and the United Kingdom we highlight emerging trajectories of food governance. We argue that the imposition of the new private forms of monitoring and compliance continue the project of agricultural restructuring that began with government support for structural adjustment schemes in agriculture and that these are most evident in the UK and Australia where neoliberalism is an entrenched philosophy. However, despite Norway's identity as a social democracy, we also identify neoliberal 'creep' into the system of food governance. Small-scale producers in all three nations are finding themselves increasingly subject to governance through private, market-based mechanisms that, to varying degrees, are dominated by major supermarket chains. The result is agricultural restructuring not through the traditional avenues of elected governments, but via non-elected market operatives.