685 resultados para broadcast encryption


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Africas World Cup: Critical Reflections on Play, Patriotism, Spectatorship, and Space focuses on a remarkable month in the modern history of Africa and in the global history of football. Peter Alegi and Chris Bolsmann are well-known experts on South African football, and they have assembled an impressive team of local and international journalists, academics, and football experts to reflect on the 2010 World Cup and its broader significance, its meanings, complexities, and contradictions. The World Cups sounds, sights, and aesthetics are explored, along with questions of patriotism, nationalism, and spectatorship in Africa and around the world. Experts on urban design and communities write on how the presence of the World Cup worked to refashion urban spaces and negotiate the local struggles in the hosting cities. The volume is richly illustrated by authors photographs, and the essays in this volume feature chronicles of match day experiences; travelogues; ethnographies of fan cultures; analyses of print, broadcast, and electronic media coverage of the tournament; reflections on the World Cups private and public spaces; football exhibits in South African museums; and critiques of the World Cups processes of inclusion and exclusion, as well as its political and economic legacies. The volume concludes with a forum on the World Cup, including Thabo Dladla, Director of Soccer at the University of KwaZulu-Natal, Mohlomi Kekeletso Maubane, a well-known Soweto-based writer and a soccer researcher, and Rodney Reiners, former professional footballer and current chief soccer writer for the Cape Argus newspaper in Cape Town. This collection will appeal to students, scholars, journalists, and fans. Cover illustration: South African fan blowing his vuvuzela at South Africa vs. France, Free State Stadium, Bloemfontein, June 22, 2010. Photo by Chris Bolsmann.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While issues relating to the development, legitimacy and accountability of the European Police Office, Europol, have been intensively discussed in political and academic circles, the actual impact of Europol on policy-making in the European Union has yet to receive scholarly attention. By investigating the evolution and the role of Europol's organized crime reports, this article elaborates on whether Europol has been able to exert an influence beyond its narrowly defined mandate. Theoretically informed by the assumptions of experimentalist governance, the article argues that the different legal systems and policing traditions of EU member states have made it difficult for the EU to agree on a common understanding on how to fight against organized crime. This lack of consensus, which has translated into a set of vague and broadly formulated framework goals and guidelines, has enabled Europol to position its Organized Crime Threat Assessments as the point of reference in the respective EU policy-making area. Europol's interest in improving its institutional standing thereby converged with the interest of different member states to use Europol as a socialization platform to broadcast their ideas and to ‘Europeanize’ their national counter-organized crime policy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article we review the methods used by television news channels in their reporting of the clashes between the Hungarian police and refugees at the Serbian-Hungarian border on 16th of September 2015. With the help of content analysis we examine the techniques used by each editorial board to portray events differently,resulting in dissimilar effects on recipients. During the analysis we examine news coverage for one specific day as presented by Hungarian, German and pan-European broadcasters. German news programs were chosen for comparison with Hungarian ones due to the fact that most of the refugees were heading towards Germany. We conclude that there are significant differences between the information that was broadcast according to television channels; owner expectations presumably play an important role in this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Charles Perry donated his papers of his time as president of the university to the FIU library where they are held in the archives. An interview, filmed by Richard Pabon and Elizabeth Marsh from FIU’s Broadcast Video Production team, recorded this event.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This photo shows a film crew in a house with a partial image of Betty Perry leaning in the doorway. Charles Perry donated his papers of his time as president of the university to the FIU library where they are held in the archives. An interview, filmed by Richard Pabon and Elizabeth Marsh from FIU’s Broadcast Video Production team, recorded this event.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This photo shows Betty Perry, Tom Riley, and Althea Silvera in the floor packingthe Charles Perry Papers in the Perry Palm Beach home. Charles Perry donated his papers of his time as president of the university to the FIU library where they are held in the archives. An interview, filmed by Richard Pabon and Elizabeth Marsh from FIU’s Broadcast Video Production team, recorded this event. Charles Edward Perry (Chuck), 1937-1999, was the founding president of Florida International University in Miami, Florida. He grew up in Logan County, West Virginia and received his bachelor's and masters's degrees from Bowling Green State University. He married Betty Laird in 1961. In 1969, at the age of 32, Perry was the youngest president of any university in the nation. The name of the university reflects Perry’s desire for a title that would not limit the scope of the institution and would support his vision of having close ties to Latin America. Perry and a founding corps opened FIU to 5,667 students in 1972 with only one large building housing six different schools. Perry left the office of President of FIU in 1976 when the student body had grown to 10,000 students and the university had six buildings, offered 134 different degrees and was fully accredited. Charles Perry died on August 30, 1999 at his home in Rockwall, Texas. He is buried on the FIU campus in front of the Graham Center entrance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Type systems for secure information flow aim to prevent a program from leaking information from H (high) to L (low) variables. Traditionally, bisimulation has been the prevalent technique for proving the soundness of such systems. This work introduces a new proof technique based on stripping and fast simulation, and shows that it can be applied in a number of cases where bisimulation fails. We present a progressive development of this technique over a representative sample of languages including a simple imperative language (core theory), a multiprocessing nondeterministic language, a probabilistic language, and a language with cryptographic primitives. In the core theory we illustrate the key concepts of this technique in a basic setting. A fast low simulation in the context of transition systems is a binary relation where simulating states can match the moves of simulated states while maintaining the equivalence of low variables; stripping is a function that removes high commands from programs. We show that we can prove secure information flow by arguing that the stripping relation is a fast low simulation. We then extend the core theory to an abstract distributed language under a nondeterministic scheduler. Next, we extend to a probabilistic language with a random assignment command; we generalize fast simulation to the setting of discrete time Markov Chains, and prove approximate probabilistic noninterference. Finally, we introduce cryptographic primitives into the probabilistic language and prove computational noninterference, provided that the underling encryption scheme is secure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The physical habitat used during spawning may potentially be an important factor affecting reproductive output of broadcast spawning marine fishes, particularly for species with complex, substrate-oriented mating systems and behaviors, such as Atlantic cod Gadus morhua. We characterized the habitat use and behavior of spawning Atlantic cod at two locations off the coast of southwestern Iceland during a 2-d research cruise (15–16 April 2009). We simultaneously operated two different active hydroacoustic gear types, a split beam echosounder and a dual frequency imaging sonar (DIDSON), as well as a remotely operated underwater vehicle (ROV). A total of five fish species were identified through ROV surveys: including cusk Brosme brosme, Atlantic cod, haddock Melanogrammus aeglefinus, lemon sole Microstomus kitt, and Atlantic redfish Sebastes spp. Of the three habitats identified in the acoustic surveys, the transitional habitat between boulder/lava field and sand habitats was characterized by greater fish density and acoustic target strength compared to that of sand or boulder/lava field habitats independently. Atlantic cod were observed behaving in a manner consistent with published descriptions of spawning. Individuals were observed ascending 1–5 m into the water column from the bottom at an average vertical swimming speed of 0.20–0.25 m s−1 and maintained an average spacing of 1.0–1.4 m between individuals. Our results suggest that cod do not choose spawning locations indiscriminately despite the fact that it is a broadcast spawning fish with planktonic eggs that are released well above the seafloor.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of the research is to investigate the emerging data security methodologies that will work with most suitable applications in the academic, industrial and commercial environments. Of several methodologies considered for Advanced Encryption Standard (AES), MARS (block cipher) developed by IBM, has been selected. Its design takes advantage of the powerful capabilities of modern computers to allow a much higher level of performance than can be obtained from less optimized algorithms such as Data Encryption Standards (DES). MARS is unique in combining virtually every design technique known to cryptographers in one algorithm. The thesis presents the performance of 128-bit cipher flexibility, which is a scaled down version of the algorithm MARS. The cryptosystem used showed equally comparable performance in speed, flexibility and security, with that of the original algorithm. The algorithm is considered to be very secure and robust and is expected to be implemented for most of the applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are authentication models which use passwords, keys, personal identifiers (cards, tags etc) to authenticate a particular user in the authentication/identification process. However, there are other systems that can use biometric data, such as signature, fingerprint, voice, etc., to authenticate an individual in a system. In another hand, the storage of biometric can bring some risks such as consistency and protection problems for these data. According to this problem, it is necessary to protect these biometric databases to ensure the integrity and reliability of the system. In this case, there are models for security/authentication biometric identification, for example, models and Fuzzy Vault and Fuzzy Commitment systems. Currently, these models are mostly used in the cases for protection of biometric data, but they have fragile elements in the protection process. Therefore, increasing the level of security of these methods through changes in the structure, or even by inserting new layers of protection is one of the goals of this thesis. In other words, this work proposes the simultaneous use of encryption (Encryption Algorithm Papilio) with protection models templates (Fuzzy Vault and Fuzzy Commitment) in identification systems based on biometric. The objective of this work is to improve two aspects in Biometric systems: safety and accuracy. Furthermore, it is necessary to maintain a reasonable level of efficiency of this data through the use of more elaborate classification structures, known as committees. Therefore, we intend to propose a model of a safer biometric identification systems for identification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis aims to investigate the space of radio reporting and production conditions in radio newscasts in commercial stations operating in modulated frequency (FM) in the city of Natal, Rio Grande do Norte. Through preliminary empirical observation, it was observed that this journalistic style (radio reportage) is hardly present in the schedule of local commercial radio stations, with a lack of in-depth news coverage. The research is based on the content broadcast in four daily radio news programs transmitted by commercial stations. It raises the hypothesis that the crisis that cuts across journalistic companies could be justified by the lack of financial funding in in-depth news reporting. The starting point for the case study (Yin, 2005) was a bibliographical research, for building a theoretical model of reference for the studied style, based on Prado (1989), Bespalhok (2006), Meditsch (2007), Lopes (2013) and Ferraretto (2014). The methodology also included listening to content broadcast during a week in the four analyzed news programs, participant observation and interviews with professionals who produce these programs. There were eight events with similar characteristics to radio reporting, all broadcast in just one of the analyzed programs. According to the interviewees, the format is rarely used because it would generate high businesses costs, which are prohibitively high for the stations. The research also inferred that besides the lack of entrepreneurial vision, there is accommodation of the professionals who could produce news stories even with little structure available. Finally, this work points out the need to invest more on local radio journalism to improve the quality of the information provided on commercial broadcasters in Natal and the training of journalism students to use radio's potential to maximum use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nos últimos anos tem-se verificado que a população portuguesa está cada vez mais envelhecida. Este fator agrava-se em ambientes rurais, onde a desertificação populacional é mais frequente, derivado, entre outros, da migração da população mais jovem para os grandes centros urbanos, em busca de melhores condições de vida. Tendo como consequência a exclusão social da população residente nestas zonas. O reduzido foco populacional das zonas rurais não é um fator atrativo para as entidades que realizam investimentos em serviços e infraestruturas tecnológicas, devido ao retorno financeiro obtido não ser, à partida, rentável. Levando a uma exclusão tecnológica de quem reside nestas zonas. Este fator, agrava-se na população sénior dado que raramente são estimulados a interagir com a tecnologia. Com o objetivo de contribuir para a melhoria desta problemática, combatendo simultaneamente os dois tipos de exclusões, tecnológica e social, propõem-se através desta dissertação, um serviço de videochamada, baseado no conceito do padrão Hybrid Broadcast Broadband TV (HbbTV). Um dos fatores considerados, durante o estudo deste serviço, foi a barreira tecnológica existente entre os idosos e a tecnologia. De modo a aproximar ambos, optou-se por aproveitar os conhecimentos que os idosos já possuem na utilização de equipamentos do seu quotidiano. Sendo a televisão, o equipamento selecionado para integrar no serviço de videochamada, permitindo ao idoso contactar facilmente com outras pessoas e serviços. Através da implementação de um protótipo e dos resultados obtidos, conclui-se que o serviço desenvolvido é uma solução válida para combater a problemática apresentada, contribuindo positivamente para a redução da exclusão social e da iliteracia tecnológica

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Encryption and integrity trees guard against phys- ical attacks, but harm performance. Prior academic work has speculated around the latency of integrity verification, but has done so in an insecure manner. No industrial implementations of secure processors have included speculation. This work presents PoisonIvy, a mechanism which speculatively uses data before its integrity has been verified while preserving security and closing address-based side-channels. PoisonIvy reduces per- formance overheads from 40% to 20% for memory intensive workloads and down to 1.8%, on average.