875 resultados para Security Studies
Resumo:
Insufficient access to food is known to compromise tertiary studies. Students often belong to groups known to have poor food security such as those renting or relying on government payments. The present study administered a cross-sectional survey incorporating the USDA food security survey module (FSSM) to 810 students at a metropolitan university in Brisbane, Australia. One in four students indicated they were food insecure, this being double that previously reported for tertiary students and five times that previously reported for the general population. Factors associated with food insecurity included low income, reliance on government support and renting. Students from food insecure households were twice as likely to report only fair or poor general health and three times as likely to have deferred their studies due to financial difficulties. Further, at least 80 % of these students reported that their studies were compromised. Strategies to alleviate food insecurity among students could improve retention rates and educational outcomes.
Resumo:
The emergence of shopping malls in Europe, the UK and Australia over the last thirty years or so, raises questions about the disruptive effects of such capital intensive developments on local area shopping facilities, transport and other infrastructures and the maintenance of artificially high prices for goods, whereby the promised greater choice of shops and prices is rarely a genuine free market of competition leading to lower prices. A central question to be addressed is whom these centres represent and belong to. While many claim to exist to ‘serve the community’ almost all malls and centres are private property and the community of shoppers has few, if any rights compared with the conventional high street, which is a public thoroughfare. This permits the management of the centres through their own private security staff, to observe, follow, eject and refuse further admission to anyone considered to be ‘undesirable’. What is different about the newest shopping centres is the routine use of increasingly sophisticated CCTV surveillance equipment to observe and record, for later evidential and entry restriction use, the movements of centre visitors.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
The production of fashion garments has negative environmental and social impacts that can potentially be reduced through decisions made in the design process. This research explores to what extent Australian mass-market fashion designers consider environmental sustainability within product design. The study presents three case studies from different market levels, assembled through interviews with designers, along with an analysis of the Australian mass-market fashion industry. The project provides insights into the workings of the fashion design process within mid and high volume companies, and identifies opportunities and barriers for consideration of sustainability.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
The combined techniques of in situ Raman microscopy and scanning electron microscopy (SEM) have been used to study the selective oxidation of methanol to formaldehyde and the ethene epoxidation reaction over polycrystalline silver catalysts. The nature of the oxygen species formed on silver was found to depend critically upon the exact morphology of the catalyst studied. Bands at 640, 780 and 960 cm-1 were identified only on silver catalysts containing a significant proportion of defects. These peaks were assigned to subsurface oxygen species situated in the vicinity of surface dislocations, AgIII=O sites formed on silver atoms modified by the presence of subsurface oxygen and O2 - species stabilized on subsurface oxygen-modified silver sites, respectively. The selective oxidation of methanol to formaldehyde was determined to occur at defect sites, where reaction of methanol with subsurface oxygen initially produced subsurface OH species (451 cm-1) and adsorbed methoxy species. Two distinct forms of adsorbed ethene were identified on oxidised silver sites. One of these was created on silver sites modified by the interaction of subsurface oxygen species, and the other on silver crystal planes containing a surface coverage of atomic oxygen species. The selective oxidation of ethene to ethylene oxide was achieved by the reaction between ethene adsorbed on modified silver sites and electrophilic AgIII=O species, whereas the combustion reaction was perceived to take place by the reaction of adsorbed ethene with nucleophilic surface atomic oxygen species. Defects were determined to play a critical role in the epoxidation reaction, as these sites allowed the rapid diffusion of oxygen into subsurface positions, and consequently facilitated the formation of the catalytically active AgIII=O sites.
Resumo:
Raman and Fourier transform infrared (FT-IR) spectroscopy have been applied to a systematic investigation of the adsorption and decomposition of dichlorodifluoromethane (CCl2F2, CFC-12), fluorotrichloromethane (CCl3F, CFC-11), chlorodifluoromethane (CHClF2, HCFC-22) and molecular chlorine on oxide surfaces. Additionally, the effects of heating and ultraviolet photolysis of the CFC and HCFCs adsorbed on the oxide surfaces have been investigated. Spectral features for these species indicated a small wavenumber shift (1-6 cm-1) associated with the adsorbed phase. Some evidence, specifically the appearance of the Raman band at 507 cm-1, is presented to show that chlorine decomposition species are associated with these oxide surfaces. It was concluded that the new spectral feature (at ca. 507 cm-1) related with the decomposition of the CFC and HCFC molecules was an important indicator of the extent to which the reaction between the adsorbed CFC and HCFC and oxide surface has taken place. The extent of CFC-surface interaction has been quantified in terms of a maximum (Raman) frequency shift parameter (AM). Wavenumber shifts suggest both cation-adsorbate and non-specific adsorption interactions are occurring in the internal channels of the zeolites. Slow decomposition of the adsorbed CFCs under ultraviolet-visible photolysis (at ? > 300 nm) and/or thermal treatment was observed spectroscopically. Using FT-IR spectroscopy, the formation of gas-phase products (CO, CO2, HCl) both onyn photolysis and heating was evident. Results of these measurements are compared with the observed atmospheric reactivity of these compounds.
Resumo:
Yin Chen Hao Tang preparation (YCHTP) is a classic traditional Chinese medicine formula, which is commonly used for clinical treatment of hepatological diseases. In this study, a rapid and validated high-performance liquid chromatography (HPLC) method was developed to simultaneously identify 6,7-dimethylesculetin and geniposide in rat plasma. This assay was performed on a Dikma Diamonsil RP(18) column (200 mmx4.6 mm, 5 mum) with acetonitrile-methanol-water (0.1% formic acid) as the mobile phase, showing acceptable linearity, intra- and inter-day precision and accuracy (R.S.D.=5%), and absolute recovery for two analytes (74%); the limits of quantitation were 0.4 and 1.12 mug/ml, and the limits of detection were 0.06 and 0.09 mug/ml for two analytes. The developed method was successfully applied to study the effect of formula compatibility on the pharmacokinetics of 6,7-dimethylesculetin and geniposide in YCHTP when orally administrating an effective human daily dose of YCHTP to rats. We surmise that formula compatibility can significantly influence the pharmacokinetics of YCHTP, and we have elucidated and validated the compatible administration of YCHTP.
Resumo:
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.
Resumo:
A method for the rapid and simultaneous determination of 6,7-dimethylesculetin (CAS 120-08-1) and geniposide (CAS 24512-63-8) in rat plasma has been developed, using validated high performance liquid chromatography (HPLC) with solid phase extraction (SPE). The HPLC analysis was performed on a commercially available column (200 mm x 4.6 mm, 5 microm) with acetonitrile-methanol-0.1% aqueous formic acid as mobile phase and the UV detection at 343 nm and 238 nm for 6,7-dimethylesculetin and geniposide, respectively. The calibration curves for 6,7-dimethylesculetin and geniposide were linear over the range 0.4-25.6 microg/mL and 1.12-71.68 microg/mL, respectively. The lower limits of quantitation were 0.40 microg/ mL and 1.12 microg/mL, and the lower limits of detection were 0.06 microg/mL and 0.09 microg/ mL, respectively. The intra-day and inter-day precision for 6,7-dimethylesculetin and geniposide were < 5%, whereas the absolute recovery percentages were > 74%. A successful application of the developed HPLC analysis was demonstrated for the pharmacokinetic study of a Traditional Chinese Medicine formula of Yin Chen Hao Tang preparation.
Resumo:
Global aquaculture has expanded rapidly to address the increasing demand for aquatic protein needs and an uncertain future for wild fisheries. To date, however, most farmed aquatic stocks are essentially wild and little is known about their genomes or the genes that affect important economic traits in culture. Biologists have recognized that recent technological advances including next generation sequencing (NGS) have opened up the possibility of generating genome wide sequence data sets rapidly from non-model organisms at a reasonable cost. In an era when virtually any study organism can 'go genomic', understanding gene function and genetic effects on expressed quantitative trait locus phenotypes will be fundamental to future knowledge development. Many factors can influence the individual growth rate in target species but of particular importance in agriculture and aquaculture will be the identification and characterization of the specific gene loci that contribute important phenotypic variation to growth because the information can be applied to speed up genetic improvement programmes and to increase productivity via marker-assisted selection (MAS). While currently there is only limited genomic information available for any crustacean species, a number of putative candidate genes have been identified or implicated in growth and muscle development in some species. In an effort to stimulate increased research on the identification of growth-related genes in crustacean species, here we review the available information on: (i) associations between genes and growth reported in crustaceans, (ii) growth-related genes involved with moulting, (iii) muscle development and degradation genes involved in moulting, and; (iv) correlations between DNA sequences that have confirmed growth trait effects in farmed animal species used in terrestrial agriculture and related sequences in crustacean species. The information in concert can provide a foundation for increasing the rate at which knowledge about key genes affecting growth traits in crustacean species is gained.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).