774 resultados para Key Management Protocol
Resumo:
Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to the successful enhancement of native biodiversity is unclear. Using two long term data sets, we investigate differences in successional trajectories during the establishment of butterfly (11 years) and phytophagous beetle (13 years) communities during the recreation of calcareous grassland. Overall restoration success was higher for the butterflies than the beetles. However, both shared a general pattern of rapidly increasing restoration success over the first five years, awhich approached an asymptote after c. 10 years. The use of pro-active grassland restoration to mitigate against future environmental change therefore needs to account for such time lag if the value of these habitats is to be fully realised.
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Este trabalho define e implementa um sistema de controle de consumo para redes de computadores, objetivando aumentar o tempo de operação da rede em caso de operação com recursos limitados e redução de consumo de energia em situações de fornecimento normal. Na definição do sistema, denominado NetPower, foi estabelecida uma estrutura através da qual um gerente (coordenador) monitora as atividades dos equipamentos vinculados à rede, e determina alterações nos estados de consumo respectivos, de acordo com as necessidades ou atendimento de padrões de otimização. Aos equipamentos podem ser atribuídos diferentes privilégios em uma hierarquia adaptável a diversos ambientes. Um reserva oferece opção às falhas do gerente. A implementação está baseada no protocolo SNMP (Simple Network Management Protocol) para a gerência e são considerados preponderantemente os padrões para controle de consumo dos equipamentos Advanced Power Management, APM, e Advanced Configuration and Power Interface Specification, ACPI. Além da arquitetura do gerente e dos agentes, foi definida também uma MIB (Management Information Base) para controle de consumo. No projeto do sistema, foi privilegiado o objetivo de utilização em qualquer ambiente de rede, sem preferência por equipamentos de algum fabricante específico ou por arquitetura de hardware. Tecnologias de domínio público foram utilizadas, quando possível. No futuro este sistema pode fazer parte da distribuição de sistemas operacionais, incorporando controle de consumo às redes. No texto é feita uma comparação entre os softwares existentes para controle de consumo, são apresentados os recursos de controle de consumo disponíveis nos equipamentos de computação, seguido da descrição do protocolo de gerência utilizado. Em seguida, é apresentada a proposta detalhada do sistema de controle e descrita da implementação do protótipo.
Resumo:
Este trabalho apresenta a proposta e a implementação de um sistema de gerência de energia para redes locais de computadores (Local Area Networks ou LANs). Desde sua introdução, no início dos anos 90, os mecanismos de gerência de energia para computadores têm contribuído de maneira significativa para a redução do consumo nos períodos de inatividade, mas podem ter seu efeito minimizado por uma série de fatores, dentre os quais destaca-se a conexão do equipamento a uma rede. Em linhas gerais, o objetivo do sistema proposto é, justamente, facilitar a gerência de energia em ambientes de rede. O funcionamento do sistema é baseado na aplicação de políticas de consumo definidas pelo administrador da rede. As políticas podem ser aplicadas em duas situações distintas: em horários pré-determinados (p. ex. depois do horário comercial), quando podem ajudar a reduzir o desperdício de energia, ou em resposta a alterações no fornecimento de energia, caso a rede seja protegida por no-breaks, quando a redução no consumo resulta em maior tempo de autonomia da fonte reserva (banco de baterias). As políticas são configuradas através de um mecanismo flexível, que permite não apenas desligar os equipamentos, mas colocá-los em estados intermediários de consumo e executar outros tipos de ações. A arquitetura do sistema é baseada no modelo SNMP (Simple Network Management Protocol) de gerência de redes. É composta, basicamente, de agentes, elementos de software que residem nos equipamentos da rede e detêm o conhecimento específico sobre suas características de consumo de eletricidade, e de um gerente, elemento central que contém a configuração das políticas de consumo e que é responsável pelo monitoramento e controle dos agentes. Gerente e agentes comunicam-se através do protocolo SNMP, trocando informações segundo uma base de informações (MIB) projetada especificamente para a gerência de energia. A ênfase da parte prática do trabalho está no gerente, que foi inteiramente implementado através da linguagem Java, utilizando bibliotecas disponíveis gratuitamente. Adicionalmente, foi implementado um agente-protótipo para a plataforma Windows, o que permitiu observar o sistema completo em execução. Os testes permitiram validar a praticabilidade da arquitetura e estimar o ganho potencial proporcionado pela utilização do sistema. São apresentadas medições que demonstram um aumento de até 6 vezes na autonomia do banco de baterias do no-break para uma configuração de rede pequena, utilizando o sistema para desligar automaticamente 90% dos computadores durante um corte no fornecimento externo. A economia decorrente da redução de consumo em horários de inatividade foi estimada em até R$0,63 por computador no período de um ano (tomando por base a tarifa média praticada no Brasil entre janeiro e maio de 2002).
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
INTRODUCTION: Patients undergoing hematopoietic stem cell transplantation receive high doses of chemotherapy and radiotherapy, which cause severe immunosuppression. OBJECTIVE: To report an oral disease management protocol before and after hematopoietic stem cell transplantation. METHODS: A prospective study was carried out with 65 patients aged > 18 years, with hematological diseases, who were allocated into two groups: A (allogeneic transplant, 34 patients); B (autologous transplant, 31 patients). A total of three dental status assessments were performed: in the pre-transplantation period (moment 1), one week after stem cell infusion (moment 2), and 100 days after transplantation (moment 3). In each moment, oral changes were assigned scores and classified as mild, moderate, and severe risks. RESULTS: The most frequent pathological conditions were gingivitis, pericoronitis in the third molar region, and ulcers at the third moment assessments. However, at moments 2 and 3, the most common disease was mucositis associated with toxicity from the drugs used in the immunosuppression. CONCLUSION: Mucositis accounted for the increased score and potential risk of clinical complications. Gingivitis, ulcers, and pericoronitis were other changes identified as potential risk factors for clinical complications.
Resumo:
In dentistry, the technic and radiographic processing incur the possibility of cross infection and environmental contamination. The dentist is responsible for the patient and dental team. For this reason he needs to take a protocol to prevent the spread of microorganisms and environmental exposure to risk factors. The protocols are introduced in the dentistry school as an important teaching tool, whose learning and application reinforce the importance of continuity of these actions in the professional activity. The objective of this paper is to present the biosafety and waste management protocol used in the dental radiology clinic of Araçatuba Dental School, including procedures for the prevention of biological and environmental contamination.
Resumo:
Dynamic conferencing refers to a scenario wherein any subset of users in a universe of users form a conference for sharing confidential information among themselves. The key distribution (KD) problem in dynamic conferencing is to compute a shared secret key for such a dynamically formed conference. In literature, the KD schemes for dynamic conferencing either are computationally unscalable or require communication among users, which is undesirable. The extended symmetric polynomial based dynamic conferencing scheme (ESPDCS) is one such KD scheme which has a high computational complexity that is universe size dependent. In this paper we present an enhancement to the ESPDCS scheme to develop a KD scheme called universe-independent SPDCS (UI-SPDCS) such that its complexity is independent of the universe size. However, the UI-SPDCS scheme does not scale with the conference size. We propose a relatively scalable KD scheme termed as DH-SPDCS that uses the UI-SPDCS scheme and the tree-based group Diffie- Hellman (TGDH) key exchange protocol. The proposed DH-SPDCS scheme provides a configurable trade-off between computation and communication complexity of the scheme.
Resumo:
The security of the two party Diffie-Hellman key exchange protocol is currently based on the discrete logarithm problem (DLP). However, it can also be built upon the elliptic curve discrete logarithm problem (ECDLP). Most proposed secure group communication schemes employ the DLP-based Diffie-Hellman protocol. This paper proposes the ECDLP-based Diffie-Hellman protocols for secure group communication and evaluates their performance on wireless ad hoc networks. The proposed schemes are compared at the same security level with DLP-based group protocols under different channel conditions. Our experiments and analysis show that the Tree-based Group Elliptic Curve Diffie-Hellman (TGECDH) protocol is the best in overall performance for secure group communication among the four schemes discussed in the paper. Low communication overhead, relatively low computation load and short packets are the main reasons for the good performance of the TGECDH protocol.
Resumo:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Resumo:
La extrema competitividad derivada de la globalización, hace que los proyectos en Tecnologías de la Información (TI), no se valoren por si son buenos o malos. Se da por supuesto que el producto tecnológico es innovador, aporta un valor añadido y tiene un fundamento tecnológico sólido y bien construido. Europa es un gran exponente en Desarrollo e Investigación (I+D), pero todavía está por detrás de países como Estados Unidos o Japón en cuanto a Innovación (i). Nos falta conseguir llegar al mercado. No basta con conseguir con éxito una prueba de concepto. Hay que ir más allá. Partimos de la base de un proyecto: Secretify, un cliente de correo web multicuenta sencillo y atractivo que permite a los usuarios cifrar sus comunicaciones utilizando cuentas de correo electrónico ya existentes, sin la necesidad de saber nada sobre seguridad, criptografía o gestión de claves. La finalidad de este Trabajo es aplicar todos los conceptos aprendidos durante el Máster (en concreto en la rama de Gestión, Innovación y Negocio TI), para convertir Secretify en un producto que sacar al mercado con éxito, teniendo los conocimientos tanto técnicos como empresariales, para minimizar los riesgos y adecuarse al mercado.---ABSTRACT---The extreme competitiveness derived from globalization, makes projects in Information Technologies (IT) to not be evaluated for its goodness. It is assumed that the technology product is innovative, provides added value and has a solid technology basis and well constructed. Europe is a great exponent in Research & Development (R&D), but It is still far behind from countries like USA or Japan in terms of Innovation (i). We need to reach the market: it is not enough having a successful proof of concept. We must go further. We start from a project: Secretify, a simple and beautiful web-based multiaccount email client that allow users to cypher their communications using already existing email accounts, without the need to know about security, cryptography or key management. The purpose of this thesis is to apply all concepts learnt during the Master course (specifically in Management, Innovation and IT business), to turn Secretify into a successful market launch, having the technical and business knowledges, in order to reduce the risks and to adapt to the market.
Resumo:
We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.
Resumo:
Gram-positive microorganisms, specifically coagulase-negative staphylococci are the most common species recovered from clinical culture specimens of patients with end-stage renal disease. The propensity of coagulase-negative staphylococci (CNS) to cause infection in this patient group has been widely debated. However, it is still unclear how this usually avirulent commensal microorganism produces infection that contributes to high rates of morbidity and mortality in patients with end-stage renal disease. The aim of this thesis was to investigate the rate, geographical distribution, molecular and phenotypic mechanisms of Gram-positive microorganisms associated with infection in renal dialysis patients. In addition, it sought to assess the value of early serological diagnosis of dialysis catheter-associated infection and the effect of antimicrobial treatment regimens on the faecal carriage of enteric microorganisms. In this study, the incidence of haemodialysis catheter-associated infection was established with the Meditrend audit tool. This tool was used to assess the infection outcomes of catheter insertion and management procedures until the catheter was explanted. Introduction of a catheter management protocol decreased the incidence of catheter-related infection. Staphylococcal species recovered from episodes of haemodialysis catheter-associated infection and continuous ambulatory peritoneal dialysis (CAPD)-associated peritonitis were genotyped by determination of macrorestriction profiles with pulsed-field gel electrophoresis. This highlighted horizontal transfer of microorganisms between different patients and the environment. The phenotypic characteristics of these strains were also investigated to determine characteristics that could be used as markers for dialysis catheter-associated infection. The expression of elastase, lipase and esterase by CNS was significantly associated with infection. A rapid enzyme-linked immunosorbent assay incorporating a novel staphylococcal antigen (lipid S) was used to evaluate the early detection of anti-staphylococcal immunoglobulin gamma in patient sera. The comparison of culture positive and culture negative patients demonstrated a steady state of immune activation in both groups. However anti-lipid S serum antibody titres > 1000 were found to be a predictor of infection. The effect on faecal carriage of vancomycin resistant enterococci (VRE) and Clostridium difficile toxins in patients treated with CAPD when empiric cephalosporin therapy was substituted for piperacillin/tazobactam was investigated. The introduction of piperacillin/tazobactam demonstrated a decrease in the faecal carriage of VRE.
Resumo:
The statistical distribution, when determined from an incomplete set of constraints, is shown to be suitable as host for encrypted information. We design an encoding/decoding scheme to embed such a distribution with hidden information. The encryption security is based on the extreme instability of the encoding procedure. The essential feature of the proposed system lies in the fact that the key for retrieving the code is generated by random perturbations of very small value. The security of the proposed encryption relies on the security to interchange the secret key. Hence, it appears as a good complement to the quantum key distribution protocol. © 2005 Elsevier B.V. All rights reserved.
Resumo:
The rapid growth of emerging markets’ multinational companies (MNCs) is a recent phenomenon and, as such, their nature and structure of key management processes, functions, and roles need further examination. While an abundance of low-cost labor is often the starting point of competitive advantage for many of the emerging markets’ MNCs, it is the optimum configuration of people, processes, and technology that defines how they leverage their intangible resources. Based on case studies of four Indian IT services MNCs, involving 51 in-depth interviews of business and human resource (HR) leaders at the corporate and subsidiary levels, we identify five key HR roles—namely, strategic business partner, guardian of culture, builder of global workforce and capabilities, champion of processes, and facilitator of employee development. The analysis also highlights that the HR function in Indian IT service MNCs faces several challenges in consolidating the early gains of internationalization, such as lack of decentralized decision making, developing a global mind-set, localization of the workforce, and developing a global leadership pipeline. Based on our exploratory findings, we propose a framework outlining the global HR roles pursued by emerging IT services MNCs, the factors influencing them, and the challenges facing their HR function for future research.