936 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshkoff and Lubomir Tschakaloff , Sofia, July, 2006. The material in this paper was presented in part at INDOCRYPT 2002

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Japan is an important ally of the United States–the world’s third biggest economy, and one of the regional great powers in Asia. Making sense of Japan’s foreign and security policies is crucial for the future of peace and stability in Northeast Asia, where the possible sources of conflict such as territorial disputes or the disputes over Japan’s war legacy issues are observed. This dissertation explored Japan’s foreign and security policies based on Japan’s identities and unconscious ideologies. It employed an analysis of selected Japanese films from the late 1940s to the late 1950s, as well as from the late 1990s to the mid-2000s. The analysis demonstrated that Japan’s foreign and security policies could be understood in terms of a broader social narrative that was visible in Japanese popular cultural products, including films and literatures. Narratives of Japanese families from the patriarch’s point of view, for example, had constantly shaped Japan’s foreign and security policies. As a result, the world was ordered hierarchically in the eyes of the Japan Self. In the 1950s, Japan tenaciously constructed close but asymmetrical security relations with the U.S. in which Japan willingly subjugated itself to the U.S. In the 2000s, Japan again constructed close relations with the U.S. by doing its best to support American responses to the 9/11 terrorist attacks by mobilizing Japan’s SDFs in the way Japan had never done in the past. The concepts of identity and unconscious ideology are helpful in understanding how Japan’s own understanding of self, of others, and of the world have shaped its own behaviors. These concepts also enable Japan to reevaluate its own behaviors reflexively, which departs from existing alternative approaches. This study provided a critical analytical explanation of the dynamics at work in Japan’s sense of identity, particularly with regard to its foreign and security policies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wydział Matematyki i Informatyki UAM

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Japan is an important ally of the United States–the world’s third biggest economy, and one of the regional great powers in Asia. Making sense of Japan’s foreign and security policies is crucial for the future of peace and stability in Northeast Asia, where the possible sources of conflict such as territorial disputes or the disputes over Japan’s war legacy issues are observed.^ This dissertation explored Japan’s foreign and security policies based on Japan’s identities and unconscious ideologies. It employed an analysis of selected Japanese films from the late 1940s to the late 1950s, as well as from the late 1990s to the mid-2000s. The analysis demonstrated that Japan’s foreign and security policies could be understood in terms of a broader social narrative that was visible in Japanese popular cultural products, including films and literatures. Narratives of Japanese families from the patriarch’s point of view, for example, had constantly shaped Japan’s foreign and security policies. As a result, the world was ordered hierarchically in the eyes of the Japan Self. In the 1950s, Japan tenaciously constructed close but asymmetrical security relations with the U.S. in which Japan willingly subjugated itself to the U.S. In the 2000s, Japan again constructed close relations with the U.S. by doing its best to support American responses to the 9/11 terrorist attacks by mobilizing Japan’s SDFs in the way Japan had never done in the past.^ The concepts of identity and unconscious ideology are helpful in understanding how Japan’s own understanding of self, of others, and of the world have shaped its own behaviors. These concepts also enable Japan to reevaluate its own behaviors reflexively, which departs from existing alternative approaches. This study provided a critical analytical explanation of the dynamics at work in Japan’s sense of identity, particularly with regard to its foreign and security policies.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In modern society, security issues of IT Systems are intertwined with interdisciplinary aspects, from social life to sustainability, and threats endanger many aspects of every- one’s daily life. To address the problem, it’s important that the systems that we use guarantee a certain degree of security, but to achieve this, it is necessary to be able to give a measure to the amount of security. Measuring security is not an easy task, but many initiatives, including European regulations, want to make this possible. One method of measuring security is based on the use of security metrics: those are a way of assessing, from various aspects, vulnera- bilities, methods of defense, risks and impacts of successful attacks then also efficacy of reactions, giving precise results using mathematical and statistical techniques. I have done literature research to provide an overview on the meaning, the effects, the problems, the applications and the overall current situation over security metrics, with particular emphasis in giving practical examples. This thesis starts with a summary of the state of the art in the field of security met- rics and application examples to outline the gaps in current literature, the difficulties found in the change of application context, to then advance research questions aimed at fostering the discussion towards the definition of a more complete and applicable view of the subject. Finally, it stresses the lack of security metrics that consider interdisciplinary aspects, giving some potential starting point to develop security metrics that cover all as- pects involved, taking the field to a new level of formal soundness and practical usability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this work we evaluated the photophysical and in vitro properties of Foscan (R), a second-generation photosensitizer drug (PS) widely used in systemic clinical protocols for cancer therapy based on Photodynamic Therapy (PDT). We employed biodegradable nanoemulsions (NE) as a colloidal vehicle of the oil/water (o/w) type focusing in topical administration of Foscan (R) and other photosensitizer drugs. This formulation was obtained and stabilized by the methodology described by Tabosa do Egito et al.,(30) based on the mixture of two phases: an aqueous solution and an organic medium consisting of nonionic surfactants and oil. The photodynamic potential of the drug incorporated into the NE was studied by steady-state and time-resolved spectroscopic techniques. We also analyzed the in vitro biological behavior carried out in mimetic biological environment protocols based on the animal model. After topical application in a skin animal model, we evaluated the Foscan (R)/NE diffusion flux into the skin layers (stratum corneum and epidermis + dermis) by classical procedures using Franz Diffusion cells. Our results showed that the photophysical properties of PS were maintained after its incorporation into the NE when compared with homogeneous organic medium. The in vitro assays enabled the determination of an adequate profile for the interaction of this system in the different skin layers, with an ideal time lag of 6 h after topical administration in the skin model. The Foscan (R) diffusion flux (J) was increased when this PS was incorporated into the NE, if compared with its flux in physiological medium. These parameters demonstrated that the NE can be potentially applied as a drug delivery system (DDS) for Foscan (R) in both in vitro and in vivo assays, as well as in future clinical applications involving topical skin cancer PDT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: In the literature there is no validated instrument for the clinical evaluation of the orofacial myofunctional condition of children that will permit the examiner to express numerically his perception of the characteristics and behaviors observed. The proposal of this study is to describe a protocol for the evaluation of children aged 6-12 years in order to establish relations between the orofacial. myofunctional conditions and numerical scales. The protocol validity, reliability of the examiners and agreement between them was analyzed. Methods: Eighty children aged 6-12 years participated in the study. All were evaluated and 30 were selected at random for the analyses (age range: 72-149 months, mean = 103.3, S.D. = 23.57). Individuals with and without orofacial myofunctional. disorders were included. The examiners were two speech therapists property calibrated in orofacial myofunctional evaluation. Two protocols were constructed. One, based on traditional models, was called traditional orofacial. myofunctional. evaluation (TOME), and the other, with the addition of numerical scales, was called orofacial myofunctional. evaluation with scores (OMES). The clinical conditions included were: appearance, posture and mobility of lips, tongue, cheeks and jaws, respiration, mastication and deglutition. Statistical analysis was performed using the split-half reliability method. Means, standard deviations and the Spearman correlation coefficient were also calculated. Results: There was a statistically significant correlation between the evaluations of 30 children assessed with the TOME and OMES protocols (r = 0.85, p < 0.01). The reliability between protocols was 0.92. The test-retest reliability of the OMES instrument was 0.99 and the correlation was 0.98. Reliability between examiners 1 and 2 using the OMES protocol was 0.99, and the correlation was 0.98 (P < 0.01). Conclusion: The OMES protocot proved to be a valid and reliable instrument for orofacial myofunctional evaluation, permitting the grading of orofacial myofunctional conditions within the limits of the selected items. (c) 2007 Elsevier Ireland Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RESUMO: O Líbano é um pequeno país na costa leste do Mar Mediterrâneo, com uma população de aproximadamente 4.350.000 pessoas, incluindo 1,5 milhões de refugiados, 400 mil dos quais são palestinos atendidos pela UNRWA (Agência das Nações Unidas de Socorro aos Refugiados da Palestina) (UNHCR, 2013; OMS, 2010a). Desde 2012, um excedente de 1.000.000 refugiados sírios cruzaram a fronteira com o Líbano, representando um aumento populacional de aproximadamente 25%. Além disso, entre 1975 e 1990, a violenta guerra civil pela qual o Líbano passou, destruiu grande parte da infra-estrutura do país, incluindo os serviços de saúde. O sector da saúde, mais especificamente os serviços de saúde mental, é majoritariamente privado. Serviços especializados em Saúde Mental estão disponíveis em três hospitais psiquiátricos privados, e em 4 unidades psiquiátricas de hospitais gerais, que estão localizados centralmente em torno da capital, Beirute. O Líbano é um dos dois únicos países da região que não tem uma Política de Saúde Mental e um dos seis países que não têm uma Legislação em Saúde Mental. Nos últimos anos, a Saúde Mental está sendo colocada no topo da agenda nacional, apesar das contínuas questões políticas e de segurança. Baseando-se nas informações acima, um projecto de estratégia em Saúde Mental, conduzido pelo Ministério da Saúde e apoiado pela OMS, foi escrito para servir como um guia para trabalhar em diferentes aspectos relacionados tanto em saúde mental quanto em organização dos serviços, revisão de legislação, financiamento e proteção dos direitos humanos básicos dos usuários do serviço. Esta tese descreve o processo pelo qual o projecto de estratégia nacional de Saúde Mental foi desenvolvido, seus principais componentes, os próximos passos a serem tomados para a sua implementação, os desafios e as oportunidades para implementá-lo e propõe alguns passos iniciais a serem tomados em primeiro lugar.----------ABSTRACT: Lebanon is a small country on the eastern shore of the Mediterranean Sea with a population of approximately 4,350,000 including 1,500,000 refugees, 400,000 of whom are Palestinians served by UNRWA (the United Nations Relief and Works Agency for Palestine Refugees) (UNHCR, 2013; WHO, 2010a). Since 2012 an excess of 1,000,000 Syrian refugees have crossed the border into Lebanon accounting for approximately 25% increase in the population. In addition, from 1975 to 1990 Lebanon underwent a violent civil war that had also destroyed much of the country infrastructure including health services. The health sector, more so the mental health services, is mostly private. Specialized Mental Health services are available at three private mental hospitals, and 4 psychiatric units within general hospitals, which are located centrally around the capital, Beirut. Lebanon is one of only two countries of the region that does not have a Mental Health policy and one out of the six countries that does not have a Mental Health legislation. In recent years, Mental Health is getting placed higher on the national agenda despite the ever continuing political and security issues. Based on the above, A Mental Health strategy draft, lead by the Ministry of Health and supported by WHO, was written to serve as a guide to work on different aspects related to Mental Health from service organization, to the revision of legislation, financing and the protection of the basic human rights of service users. This thesis describes the process through which the national Mental Health draft strategy was developed, its main components, the next steps to be taken for its implementation, the challenges and the opportunities to implementing it and proposes a few initial steps to be taken first.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aquest memoria descriu els fonaments teòrics i la funcionalitat d'una aplicació per a cifrar arxius i directoris utilitzant la norma PKCS#5 dels laboratoris RSA, a més d'una modificació de la norma (algorisme TripelDES) per a aconseguir cifres més fortes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Insulin resistance is a transitory phenomenon of the metabolic response to trauma. In uncomplicated operations it lasts for 2-4 weeks postoperatively, and is directly related to the magnitude of the injury. The fasting status caused by conventional fasting protocols aggravates this resistance and may induce hyperglycemia. Conventional preoperative fasting time may aggravate this resistance and increment the elevation of glycemia especially because it is frequently longer than the expected 6-8h and may reach 10-16 hs. Additionally, overnight fasting may cause variable degrees of dehydration depending on the extension of the fasting period. Recently, various societies of anesthesia and nutrition have changed their guidelines to propose a reduction of preoperative fasting to 2h with clear fluids containing carbohydrates. These new protocols (ACERTO, ERAS) are based on the safety of this routine as consistently demonstrated by various randomized trials and a meta-analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cotutelle entre l’Université de Montréal et l’Université de Paris I Panthéon-Sorbonne

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nonlinear dynamics has emerged into a prominent area of research in the past few Decades.Turbulence, Pattern formation,Multistability etc are some of the important areas of research in nonlinear dynamics apart from the study of chaos.Chaos refers to the complex evolution of a deterministic system, which is highly sensitive to initial conditions. The study of chaos theory started in the modern sense with the investigations of Edward Lorentz in mid 60's. Later developments in this subject provided systematic development of chaos theory as a science of deterministic but complex and unpredictable dynamical systems. This thesis deals with the effect of random fluctuations with its associated characteristic timescales on chaos and synchronization. Here we introduce the concept of noise, and two familiar types of noise are discussed. The classifications and representation of white and colored noise are introduced. Based on this we introduce the concept of randomness that we deal with as a variant of the familiar concept of noise. The dynamical systems introduced are the Rossler system, directly modulated semiconductor lasers and the Harmonic oscillator. The directly modulated semiconductor laser being not a much familiar dynamical system, we have included a detailed introduction to its relevance in Chaotic encryption based cryptography in communication. We show that the effect of a fluctuating parameter mismatch on synchronization is to destroy the synchronization. Further we show that the relation between synchronization error and timescales can be found empirically but there are also cases where this is not possible. Studies show that under the variation of the parameters, the system becomes chaotic, which appears to be the period doubling route to chaos.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La presente monografía pretende responder a la pregunta ¿Cuál ha sido la incidencia del proceso de securitización entre México-Estados Unidos frente al crimen organizado en el periodo 2005-2012? Respecto a este cuestionamiento se plantea que el proceso de securitización del crimen organizado entre México y Estados Unidos logró conformar una identidad conjunta y ampliar la agenda de seguridad en relación con la acción del Crimen Organizado. Esto mediante la creación de un Complejo de Seguridad Regional basado en el principio de responsabilidad compartida. Sin embargo, la forma de abordar dicha amenaza se ha visto orientada a esquemas propios de la seguridad tradicional, que no corresponden con la estructura organizativa y actividades delictivas de las organizaciones criminales mexicanas.