845 resultados para Secure Authentication for Broadcast (DNP3-SAB)
Resumo:
Accessibility to housing for low to moderate income groups in Australia has been experiencing a severe decline since 2001. On the supply side, the public sector has been reducing its commitment to the direct provision of public housing. Despite high demand for affordable housing, there has been limited supply generated by non-government housing providers. One possible solution to promote an increase in affordable housing supply, like other infrastructure, is through the development of multi-stakeholder partnerships and private financing. This research aims to identify current issues underlying decision-making criteria for building multi-stakeholder partnerships to deliver affordable housing projects. It also investigates strategies for minimising risk and ensuring the financial outcomes of these partnership arrangements. A mix of qualitative in-depth interviews and quantitative surveys has been used as the main method to explore stakeholder experiences regarding their involvement in partnership arrangements in the affordable housing sector in Queensland. Two sets of interviews were conducted following an exploratory pilot study: one set in 2003-2004 and the other in 2007-2008. There were nineteen respondents representing government, private and not-for-profit organisations in the first stage interviews and surveys. The second stage interviews were focussed on twenty-two housing providers in South East Queensland. Initial analyses have been conducted using thematic and statistical analyses. This study extends the use of existing decision making tools and combines the use of a Soft System Framework to analyse the ideal state questionnaires using qualitative thematic analysis. Soft System Methodology (SSM) has been used to analyse this unstructured complex problem by using systematic thinking to develop a conceptual model and carrying it to the real world situations to solve the problem. This research found that the diversity of stakeholder capability and their level of risk acceptance will allow partnerships to develop the best synergies and a degree of collaboration which achieves the required financial return within acceptable risk parameters. However, some of the negativity attached to future commitment to such partnerships has been found to be the anticipation of a worse outcome than that expected from independent action. Many interviewees agree that housing providers' fear of financial risk and community rejection has been central to dampening their enthusiasm for entering such investment projects. The creation of a mixed-use development structure will mitigate both risk and return as the commercial income will subsidise the affordable housing development and will normalise concentration of marginalised low-income people who live in a prime location with an award winning design. In addition, tenant support schemes and rent-to-buy incentive programs will encourage them to secure their tenancies and significantly reduce the risk of rent arrears and property damage. There is also a breakthrough investment vehicle offered by the social developer which sells the non-physical but financial product to individual and institutional investors to mitigate further financial risk. Finally, this study recommends modification of the current value-for-money framework in favour of broader partnership arrangements which are more closely aligned with risk minimisation strategies.
Resumo:
Vehicular ad hoc network (VANET) is a wireless ad hoc network that operates in a vehicular environment to provide communication between vehicles. VANET can be used by a diverse range of applications to improve road safety. Cooperative collision warning system (CCWS) is one of the safety applications that can provide situational awareness and warning to drivers by exchanging safety messages between cooperative vehicles. Currently, the routing strategies for safety message dissemination in CCWS are scoped broadcast. However, the broadcast schemes are not efficient as a warning message is sent to a large number of vehicles in the area, rather than only the endangered vehicles. They also cannot prioritize the receivers based on their critical time to avoid collision. This paper presents a more efficient multicast routing scheme that can reduce unnecessary transmissions and also use adaptive transmission range. The multicast scheme involves methods to identify an abnormal vehicle, the vehicles that may be endangered by the abnormal vehicle, and the latest time for each endangered vehicle to receive the warning message in order to avoid the danger. We transform this multicast routing problem into a delay-constrained minimum Steiner tree problem. Therefore, we can use existing algorithms to solve the problem. The advantages of our multicast routing scheme are mainly its potential to support various road traffic scenarios, to optimize the wireless channel utilization, and to prioritize the receivers.
Resumo:
Natural disasters and deliberate, willful damage to telecommunication infrastructure can result in a loss of critical voice and data services. This loss of service hinders the ability for efficient emergency response and can cause delays leading to loss of life. Current mobile devices are generally tied to one network operator. When a disaster is of significant impact, that network operator cannot be relied upon to provide service and coverage levels that would normally exist. While some operators have agreements with other operators to share resources (such as network roaming) these agreements are contractual in nature and cannot be activated quickly in an emergency. This paper introduces Fourth Generation (4G) wireless networks. 4G networks are highly mobile and heterogeneous, which makes 4G networks highly resilient in times of disaster.
Resumo:
Even for a casual observer of the journalistic industry it is becoming difficult to escape the conclusion that journalism is entering a time of crisis. At the same time that revenues and readerships for traditional publications from newspapers to broadcast news are declining, journalistic content is being overtaken by a flotilla of alternative options ranging from the news satire of The Daily Show in the United States to the citizen journalism of South Korea’s OhmyNews and a myriad of other news blogs and citizen journalism Websites. Worse still, such new competitors with the products of the journalism industry frequently take professional journalists themselves to task where their standards have appeared to have slipped, and are beginning to match the news industry’s incumbents in terms of insight and informational value: recent studies have shown, for example, that avid Daily Show viewers are as if not better informed about the U.S. political process as those who continue to follow mainstream print or television news (see e.g. Fox et al., 2007). The show’s host Jon Stewart – who has consistently maintained his self-description as a comedian, not a journalist – even took the fight directly to the mainstream with his appearance on CNN’s belligerent talk show Crossfire, repeatedly making the point that the show’s polarised and polarising ‘left vs. right’ format was “hurting” politics in America (the show disappeared from CNN’s line-up a few months after Stewart’s appearance; Stewart, 2004). Similarly, news bloggers and citizen journalists have shown persistence and determination both in uncovering political and other scandals, and in highlighting the shortcomings of professional journalism as it investigates and reports on such scandals.
Resumo:
Purpose: As part of a comprehensive research study looking at implementing PPPs, interviews with experienced researchers were conducted to realize their views on private sector involvement in public works projects. Design / methodology / approach: Amongst these interviews, five were launched with academics from Hong Kong and Australia, and two were conducted with Legislative Councillors of the Hong Kong Special Administration Region (HKSAR) government. Findings: The interview findings show that both Hong Kong and Australian interviewees had previously conducted some kind of research in the field of PPP. The interviewees highlighted that “Different risk profiles” and “Private sector more innovative / efficient” were the main differences between projects that were procured by PPP and traditionally. Other differences include risk transfer. In a PPP arrangement the public sector passes on a substantial amount of the project risks to the private sector, whereas in a traditional case the public sector would take the largest responsibility in bearing these risks. Another common feature of the private sector is that they tend to be more efficient and innovative when compared to the public sector hence their expertise is often reflected in PPP projects. The interviewees agreed that the key performance indicators for PPP projects were unique depending on the individual project. The critical success factors mentioned by both groups of interviewees included “Transparent process”, “Project dependent” and “Market need”. Due to the fact that PPP projects tend to be large scaled costly projects, adequate transparency in the process is necessary in order to demonstrate that a fair selection and tendering process is conducted. A market need for the project is also important to ensure that the project will be financially secure and that the private sector can make a reasonable profit to cover their project expenditure. Originality / value: The findings from this study have enabled a comparative analysis between the views of researchers in two completely different jurisdictions. With the growing popularity to implement PPP projects, it is believed that the results presented in this paper would be of interest to the industry at large.
Resumo:
This paper presents an Airborne Systems Laboratory for Automation Research. The Airborne Systems Laboratory (ASL) is a Cessna 172 aircraft that has been specially modified and equipped by ARCAA specifically for research in future aircraft automation technologies, including Unmanned Airborne Systems (UAS). This capability has been developed over a long period of time, initially through the hire of aircraft, and finally through the purchase and modification of a dedicated flight-testing capability. The ASL has been equipped with a payload system that includes the provision of secure mounting, power, aircraft state data, flight management system and real-time subsystem. Finally, this system has been deployed in a cost effective platform allowing real-world flight-testing on a range of projects.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
This paper presents the results from a study of information behaviors in the context of people's everyday lives undertaken in order to develop an integrated model of information behavior (IB). 34 participants from across 6 countries maintained a daily information journal or diary – mainly through a secure web log – for two weeks, to an aggregate of 468 participant days over five months. The text-rich diary data was analyzed using a multi-method qualitative-quantitative analysis in the following order: Grounded Theory analysis with manual coding, automated concept analysis using thesaurus-based visualization, and finally a statistical analysis of the coding data. The findings indicate that people engage in several information behaviors simultaneously throughout their everyday lives (including home and work life) and that sense-making is entangled in all aspects of them. Participants engaged in many of the information behaviors in a parallel, distributed, and concurrent fashion: many information behaviors for one information problem, one information behavior across many information problems, and many information behaviors concurrently across many information problems. Findings indicate also that information avoidance – both active and passive avoidance – is a common phenomenon and that information organizing behaviors or the lack thereof caused the most problems for participants. An integrated model of information behaviors is presented based on the findings.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
The management of congenital talipes equinovarus (TEV) has received much clinical and research attention within the disciplines of medicine and physiotherapy. However, few articles have been published about the role of the registered nurse in contributing to the optimum health and wellbeing of the child and family presenting for assessment and treatment of the condition. Much of the most intense treatment for TEV occurs in the first few weeks of the child’s life; a time of critical growth and development when the infant is both sensitive and vulnerable to the environment within which it is nurtured. This is also a crucial time for developing a secure attachment to the caregiver and nurses can assist parents in optimising their infant’s opportunities for a secure attachment relationship. This paper thus provides an overview of the medical and physiotherapy management of TEV and highlights the role nurses have in providing nursing care and psycho-social support to parents of infants with TEV, in areas such as the maintenance of skin integrity and circulation, providing effective pain relief, and optimising growth, development, and a secure attachment relationship. Congenital TEV or 'club foot' is one of the most common congenital orthopaedic anomalies of infants. In Queensland in 2000, in approximately 50,000 births, 244 infants were born with talipes; almost five infants per 1000 births. National statistics are not as specific, with coding providing only 'other lower limb' as the category that would encompass talipes; the 1997 national incidence of such lower limb congenital malformations is reported as 1.7 per 10,000 births 1.
Resumo:
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.
Resumo:
This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.
Resumo:
In this paper we present a novel platform for underwater sensor networks to be used for long-term monitoring of coral reefs and �sheries. The sensor network consists of static and mobile underwater sensor nodes. The nodes communicate point-to-point using a novel high-speed optical communication system integrated into the TinyOS stack, and they broadcast using an acoustic protocol integrated in the TinyOS stack. The nodes have a variety of sensing capabilities, including cameras, water temperature, and pressure. The mobile nodes can locate and hover above the static nodes for data muling, and they can perform network maintenance functions such as deployment, relocation, and recovery. In this paper we describe the hardware and software architecture of this underwater sensor network. We then describe the optical and acoustic networking protocols and present experimental networking and data collected in a pool, in rivers, and in the ocean. Finally, we describe our experiments with mobility for data muling in this network.
Resumo:
At the turn of the millennium, the Earth’s human population has reached unprecedented levels and its natural resources are being pushed to the limit. Thus, cities are focused on sustainable development and they have begun to develop new strategies for improving the built environment. Sustainable development provides the best outcomes for the human and natural environments by improving the quality of life that protects and balances the ecological, social and economic values. This brings us to the main point: to build a sustainable built environment, cities need to redesign many of their technologies and planning policies within the context of ecological principles. As an environmental sustainability index model, ASSURE is developed to investigate the present environmental situation of an urban area by assessing the impacts of development pressure on natural resources. It is an innovative approach to provide the resilience and function of urban ecosystems secure against the environmental degradation for now and the future. This paper aims to underline the importance of the model (ASSURE) in preserving biodiversity and natural ecosystems in the built environment and investigate its role in delivering long-term urban planning policies.
Resumo:
When the colonisers first came to Australia there was an urgent desire to map, name and settle. This desire, in part, stemmed from a fear of the unknown. Once these tasks were completed it was thought that a sense of identity and belonging would automatically come. In Anglo-Australian geography the map of Australia was always perceived in relationship to the larger map of Europe and Britain. The quicker Australia could be mapped the quicker its connection with the ‘civilised’ world could be established. Official maps could be taken up in official history books and a detailed monumental history could begin. Australians would feel secure in where they were placed in the world. However, this was not the case and anxieties about identity and belonging remained. One of the biggest hurdles was the fear of the open spaces and not knowing how to move across the land. Attempts to transpose colonisers’ use of space onto the Australian landscape did not work and led to confusion. Using authors who are often perceived as writers of national fictions (Henry Lawson, Barbara Baynton, Patrick White, David Malouf and Peter Carey) I will reveal how writing about space becomes a way to create a sense of belonging. It is through spatial knowledge and its application that we begin to gain a sense of closeness and identity. I will also look at how one of the greatest fears for the colonisers was the Aboriginal spatial command of the country. Aborigines already had a strongly developed awareness of spatial belonging and their stories reveal this authority (seen in the work of Lorna Little, Mick McLean) Colonisers attempted to discredit this knowledge but the stories and the land continue to recognise its legitimacy. From its beginning Australian spaces have been spaces of hybridity and the more the colonisers attempted to force predetermined structures onto these spaces the more hybrid they became.