841 resultados para Third-party Joinder


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a  < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2006] QCA 540 the Queensland Court of Appeal dismissed an appeal from the decision of Mullins J at first instance in ASIC v Atlantic 3 Financial (Aust) Pty LTd [2006] QSC 152, the majority concluding that the client agreement in issue was not inconsistent with s48 of the Queensland Law Society Act 1952.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Kimtran Pty Ltd v Downie [2003] QDC 043 the court allowed in part an appeal from the refusal by the Queensland Building Tribunal to order the respondent liquidators pay the appellants' costs of proceedings in the Tribunal. The decision involved an examination of authorities which have considered the circumstances in which it is in the interests of justice to make an order for costs against a non-party.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A nonlinear process is considered of the surface wave third harmonics generation in a slowing-down semiconductor-metal structure. The process is conditioned by non-parabolicity of the charge carrier dispersion law. It is shown that in narrow-gap semiconducting materials it is necessary to account for the process together with the surface wave second harmonics generation conditioned by nonlinearity of quasi-hydrodynamics and the Maxwell equations. The conclusion is made that the third harmonies amplitude in narrow-gap semiconductors may exceed substantially the signal amplitude at the 3w frequency in a gas plasma and be of the same order with the surface waves second harmonies amplitude.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the third TAProViz workshop being run at BPM. The intention this year is to consolidate on the results of the previous successful workshops by further developing this important topic, identifying the key research topics of interest to the BPM visualization community. We note this year the continuing interest in the visualisation of process mining data and resultant process models. More info at: http://wst.univie.ac.at/topics/taproviz14/

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With Ten’s new drama Party Tricks set for an October 6 premiere, coverage has focused on the social media campaign to promote the show. In advance of the screening, Ten has created in-character accounts for the lead characters, Kate Ballard (Asher Keddie) and David McLeod (Rodger Corser)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

YouTube is contemplating the launch of a new music service. But how would such a service fare against established music services like Spotify, Rdio, and Pandora? All these services are referred to as “access-based music services”. They offer music listeners access to millions of songs they can listen to as much as they want for free (with advertising and only basic functionality) or for a monthly subscription fee (without advertising)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A 3hr large scale participatory installation/event that included live performance, video works,objects, fabric sculptures and was the result of a three month artist residency undertaken by Cam Lab (Jemima Wyman and Anna Mayer)at the Museum of Contemporary Art Los Angeles California. The exhibition transformed two adjoining spaces in the museum, taking design cues from permanent collection artworks currently on view and encouraged gallery visitors to oscillate between immersion and agency as they occupy the various perspectives proposed by the installation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past six months the project has undertaken three key, separate, data collection rounds. Each of these rounds focused on essentially different issues within the broader common construct of heavy vehicle road safety. This document will initially report on a series of two key qualitative data collections rounds. Firstly it will detail findings and report on discussions held in focus groups with 43 heavy vehicle drivers. The second qualitative study involved a series of interviews undertaken with 19 police officers from various levels of command and operations within the Royal Oman Police. The final data collection round reported on in this document is a roadside survey questionnaire undertaken with 400 heavy vehicle drivers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous neuroimaging research has attempted to demonstrate a preferential involvement of the human mirror neuron system (MNS) in the comprehension of effector-related action word (verb) meanings. These studies have assumed that Broca's area (or Brodmann's area 44) is the homologue of a monkey premotor area (F5) containing mouth and hand mirror neurons, and that action word meanings are shared with the mirror system due to a proposed link between speech and gestural communication. In an fMRI experiment, we investigated whether Broca's area shows mirror activity solely for effectors implicated in the MNS. Next, we examined the responses of empirically determined mirror areas during a language perception task comprising effector-specific action words, unrelated words and nonwords. We found overlapping activity for observation and execution of actions with all effectors studied, i.e., including the foot, despite there being no evidence of foot mirror neurons in the monkey or human brain. These "mirror" areas showed equivalent responses for action words, unrelated words and nonwords, with all of these stimuli showing increased responses relative to visual character strings. Our results support alternative explanations attributing mirror activity in Broca's area to covert verbalisation or hierarchical linearisation, and provide no evidence that the MNS makes a preferential contribution to comprehending action word meanings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is the Journal of Business Venturing's (JBV) 30th birthday. Although the community of entrepreneurship scholars deserves to celebrate JBV's achievements over the last 30 years (and congratulate the journal's parents—Ian Macmillan and S. Venkataraman), my focus is more on the future of entrepreneurship (and by extension JBV). A focus on entrepreneurship is both timeless and timely. On the one hand, entrepreneurship is timeless given the long-recognized importance of entrepreneurs to economies and societies (e.g., Jean Baptiste who supposedly coined the term in about 1800). On the other hand, a discussion of entrepreneurship is timely because now that the field of entrepreneurship has achieved legitimacy, it faces both opportunities and threats. It is thus timely to acknowledge the threats and think about opportunities to advance the field. A discussion of entrepreneurship is also timely because society faces a number of grand challenges (including the durability of poverty, environmental degradation [ Dorado and Ventresca, 2013]), challenges well suited to entrepreneurial responses...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close.” David Fewer “While European and American IP maximalists have pushed for TRIPS-Plus provisions in FTAs and bilateral agreements, they are now pushing for TRIPS-Plus-Plus protections in these various forums.” Susan Sell “ACTA is a threat to the future of a free and open Internet.” Alexander Furnas “Implementing the agreement could open a Pandora's box of potential human rights violations.” Amnesty International. “I will not take part in this masquerade.” Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European Parliament Executive Summary As an independent scholar and expert in intellectual property, I am of the view that the Australian Parliament should reject the adoption of the Anti-Counterfeiting Trade Agreement 2011. I would take issue with the Department of Foreign Affairs and Trade’s rather partisan account of the negotiations, the consultations, and the outcomes associated with the Anti-Counterfeiting Trade Agreement 2011. In my view, the negotiations were secretive and biased; the local consultations were sometimes farcical because of the lack of information about the draft texts of the agreement; and the final text of the Anti-Counterfeiting Trade Agreement 2011 is not in the best interests of Australia, particularly given that it is a net importer of copyright works and trade mark goods and services. I would also express grave reservations about the quality of the rather pitiful National Interest Analysis – and the lack of any regulatory impact statement – associated with the Anti-Counterfeiting Trade Agreement 2011. The assertion that the Anti-Counterfeiting Trade Agreement 2011 does not require legislative measures is questionable – especially given the United States Trade Representative has called the agreement ‘the highest-standard plurilateral agreement ever achieved concerning the enforcement of intellectual property rights.’ It is worthwhile reiterating that there has been much criticism of the secretive and partisan nature of the negotiations surrounding the Anti-Counterfeiting Trade Agreement 2011. Sean Flynn summarizes these concerns: "The negotiation process for ACTA has been a case study in establishing the conditions for effective industry capture of a lawmaking process. Instead of using the relatively transparent and inclusive multilateral processes, ACTA was launched through a closed and secretive “‘club approach’ in which like-minded jurisdictions define enforcement ‘membership’ rules and then invite other countries to join, presumably via other trade agreements.” The most influential developing countries, including Brazil, India, China and Russia, were excluded. Likewise, a series of manoeuvres ensured that public knowledge about the specifics of the agreement and opportunities for input into the process were severely limited. Negotiations were held with mere hours notice to the public as to when and where they would be convened, often in countries half away around the world from where public interest groups are housed. Once there, all negotiation processes were closed to the public. Draft texts were not released before or after most negotiating rounds, and meetings with stakeholders took place only behind closed doors and off the record. A public release of draft text, in April 2010, was followed by no public or on-the-record meetings with negotiators." Moreover, it is disturbing that the Anti-Counterfeiting Trade Agreement 2011 has been driven by ideology and faith, rather than by any evidence-based policy making Professor Duncan Matthews has raised significant questions about the quality of empirical evidence used to support the proposal of Anti-Counterfeiting Trade Agreement 2011: ‘There are concerns that statements about levels of counterfeiting and piracy are based either on customs seizures, with the actual quantities of infringing goods in free circulation in any particular market largely unknown, or on estimated losses derived from industry surveys.’ It is particularly disturbing that, in spite of past criticism, the Department of Foreign Affairs and Trade has supported the Anti-Counterfeiting Trade Agreement 2011, without engaging the Productivity Commission or the Treasury to do a proper economic analysis of the proposed treaty. Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European Parliament, quit his position, and said of the process: "I want to denounce in the strongest possible manner the entire process that led to the signature of this agreement: no inclusion of civil society organisations, a lack of transparency from the start of the negotiations, repeated postponing of the signature of the text without an explanation being ever given, exclusion of the EU Parliament's demands that were expressed on several occasions in our assembly. As rapporteur of this text, I have faced never-before-seen manoeuvres from the right wing of this Parliament to impose a rushed calendar before public opinion could be alerted, thus depriving the Parliament of its right to expression and of the tools at its disposal to convey citizens' legitimate demands.” Everyone knows the ACTA agreement is problematic, whether it is its impact on civil liberties, the way it makes Internet access providers liable, its consequences on generic drugs manufacturing, or how little protection it gives to our geographical indications. This agreement might have major consequences on citizens' lives, and still, everything is being done to prevent the European Parliament from having its say in this matter. That is why today, as I release this report for which I was in charge, I want to send a strong signal and alert the public opinion about this unacceptable situation. I will not take part in this masquerade." There have been parallel concerns about the process and substance of the Anti-Counterfeiting Trade Agreement 2011 in the context of Australia. I have a number of concerns about the substance of the Anti-Counterfeiting Trade Agreement 2011. First, I am concerned that the Anti-Counterfeiting Trade Agreement 2011 fails to provide appropriate safeguards in respect of human rights, consumer protection, competition, and privacy laws. It is recommended that the new Joint Parliamentary Committee on Human Rights investigate this treaty. Second, I argue that there is a lack of balance to the copyright measures in the Anti-Counterfeiting Trade Agreement 2011 – the definition of piracy is overbroad; the suite of civil remedies, criminal offences, and border measures is excessive; and there is a lack of suitable protection for copyright exceptions, limitations, and remedies. Third, I discuss trade mark law, intermediary liability, and counterfeiting. I express my concerns, in this context, that the Anti-Counterfeiting Trade Agreement 2011 could have an adverse impact upon consumer interests, competition policy, and innovation in the digital economy. I also note, with concern, the lobbying by tobacco industries for the Anti-Counterfeiting Trade Agreement 2011 – and the lack of any recognition in the treaty for the capacity of countries to take measures of tobacco control under the World Health Organization Framework Convention on Tobacco Control. Fourth, I note that the Anti-Counterfeiting Trade Agreement 2011 provides no positive obligations to promote access to essential medicines. It is particularly lamentable that Australia and the United States of America have failed to implement the Doha Declaration on the TRIPS Agreement and Public Health 2001 and the WTO General Council Decision 2003. Fifth, I express concerns about the border measures in the Anti-Counterfeiting Trade Agreement 2011. Such measures lack balance – and unduly favour the interests of intellectual property owners over consumers, importers, and exporters. Moreover, such measures will be costly, as they involve shifting the burden of intellectual property enforcement to customs and border authorities. Interdicting, seizing, and destroying goods may also raise significant trade issues. Finally, I express concern that the Anti-Counterfeiting Trade Agreement 2011 undermines the role of existing international organisations, such as the United Nations, the World Intellectual Property Organization and the World Trade Organization, and subverts international initiatives such as the WIPO Development Agenda 2007. I also question the raison d'être, independence, transparency, and accountability of the proposed new ‘ACTA Committee’. In this context, I am concerned by the shift in the position of the Labor Party in its approach to international treaty-making in relation to intellectual property. The Australian Parliament adopted the Australia-United States Free Trade Agreement 2004, which included a large Chapter on intellectual property. The treaty was a ‘TRIPs-Plus’ agreement, because the obligations were much more extensive and prescriptive than those required under the multilateral framework established by the TRIPS Agreement 1994. During the debate over the Australia-United States Free Trade Agreement 2004, the Labor Party expressed the view that it would seek to mitigate the effects of the TRIPS-Plus Agreement, when at such time it gained power. Far from seeking to ameliorate the effects of the Australia-United States Free Trade Agreement 2004, the Labor Government would seek to lock Australia into a TRIPS-Double Plus Agreement – the Anti-Counterfeiting Trade Agreement 2011. There has not been a clear political explanation for this change in approach to international intellectual property. For both reasons of process and substance, I conclude that the Australian Parliament and the Australian Government should reject the Anti-Counterfeiting Trade Agreement 2011. The Australian Government would do better to endorse the Washington Declaration on Intellectual Property and the Public Interest 2011, and implement its outstanding obligations in respect of access to knowledge, access to essential medicines, and the WIPO Development Agenda 2007. The case study of the Anti-Counterfeiting Trade Agreement 2011 highlights the need for further reforms to the process by which Australia engages in international treaty-making.