946 resultados para Key Agreement Protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The decision in Hook v Boreham & QBE Insurance (Australia) Limited [2006] QDC 304 considered whether the court should go further than order that costs be assessed on the indemnity basis, but should also specify the basis by which those indemnity costs should be determined. The decision makes it clear that under r704(3) of the Uniform Civil Procedure Rules, questions of that nature are ordinarily preserved to the discretion of the Registrar.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia is undergoing a critical demographic transition: the population is ageing. By 2050, one in four Australians will be older than 65 years and by 2031, the number of older Australians requiring residential aged care will increase 63%, to 1.4 million (ABS, 2005). In anticipation of this global demographic transition, the World Health Organisation has advocated ‘active ageing’, identifying health, participation and security as the three key factors that enhance quality of life for people as they age (WHO, 2002). While there is considerable discussion and acceptance of active ageing principles, little is known about the experience of ‘active ageing’ for older Australians who live in Residential Aged Care Facilities (RACF). This research addresses this knowledge gap by exploring the key facilitators and barriers to quality of life and active ageing in aged care from the perspective of aged care residents (n=12). To do this, the project documented the initial expectations and daily life experience of new residents living in a RACF over a one-year period. Combined with in-depth interviews and surveys, the project utilised Photovoice methodology - where participants used photography to record their lived experiences. The initial findings suggest satisfaction with living in aged care centers around five key themes; resident’s mental attitude to living in aged care, forming positive peer and staff relationships, self-determination and maintaining independence, opportunities to participate in interesting activities, and living in a safe and comfortable physical environment. This paper reports on the last of these five key themes, focusing on the role of design in facilitating quality of life, specifically: “living within these walls” – safety, comfort and the physical environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents the results on the diagnostics and numerical modeling of low-frequency (∼460 KHz) inductively coupled plasmas generated in a cylindrical metal chamber by an external flat spiral coil. Experimental data on the electron number densities and temperatures, electron energy distribution functions, and optical emission intensities of the abundant plasma species in low/intermediate pressure argon discharges are included. The spatial profiles of the plasma density, electron temperature, and excited argon species are computed, for different rf powers and working gas pressures, using the two-dimensional fluid approach. The model allows one to achieve a reasonable agreement between the computed and experimental data. The effect of the neutral gas temperature on the plasma parameters is also investigated. It is shown that neutral gas heating (at rf powers≥0.55kW) is one of the key factors that control the electron number density and temperature. The dependence of the average rf power loss, per electron-ion pair created, on the working gas pressure shows that the electron heat flux to the walls appears to be a critical factor in the total power loss in the discharge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drying is a key processing techniques used in food engineering which demands continual developments on advanced analysis techniques in order to optimize the product and the process. In this regard, plant based materials are a frequent subject of interest where microstructural studies can provide a clearer understanding on the fundamental physical mechanisms involved. In this context, considering numerous challenges of using conventional numerical grid-based modelling techniques, a meshfree particle based model was developed to simulate extreme deformations of plant microstructure during drying. The proposed technique is based on a particle based meshfree method: Smoothed Particle Hydrodynamics (SPH) and a Discrete Element Method (DEM). A tissue model was developed by aggrading individual cells modelled with SPH-DEM coupled approach by initializing the cells as hexagons and aggregating them to form a tissue. The model also involves a middle lamella resembling real tissues. Using the model, different dried tissue states were simulated with different moisture content, the turgor pressure, and cell wall contraction effects. Compared to the state of the art grid-based microscale plant tissue drying models, the proposed model is capable of simulating plant tissues at lower moisture contents which results in excessive shrinkage and cell wall wrinkling. Model predictions were compared with experimental findings and a fairly good agreement was observed both qualitatively and quantitatively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

B-Raf is one of the more commonly mutated proto-oncogenes implicated in the development of cancers. In this review, we consider the mechanisms and clinical impacts of B-Raf mutations in cancer and discuss the implications for the patient in melanoma, thyroid cancer and colorectal cancer, where B-Raf mutations are particularly common.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2012, the only South East Asian countries that have ratified the 1951 Convention relating to the Status of Refugees and the 1967 Protocol Relating to the Status of Refugees (hereafter referred to as the 1951 Convention and 1967 Protocol) is Philippines (signed 1954), Cambodia (signed 1995) and Timor Leste (signed 2001). Countries such as Indonesia, Malaysia and Thailand have annual asylum seeking populations from Myanmar, South Asia and Middle East, that are estimated to be at 15 000-20 000 per country (UNHCR 2012). The lack of a permanent and formal asylum processing process in these countries means that that asylum-seeking populations in the region are reliant on the local offices of the United Nations High Commission for Refugees based in the region to process their claims. These offices rely upon the good will of these governments to have a presence near detection camps and in capital cities to process claims of those who manage to reach the UNHCR representative office. The only burden sharing mechanism within the region primarily exists under the Bali Process on People Smuggling, Trafficking in Persons and Related Transnational Crime (the Bali Process), introduced in 2002. The Bali Process refers to an informal cooperative agreement amongst the states from the Asia-Pacific region, with Australia and Indonesia as the co-chairs, which discusses its namesake: primarily anti-people smuggling activities and migration protocols. There is no provision within this process to discuss the development of national asylum seeking legislation, processes for domestic processing of asylum claims or burden sharing in contrast to other regions such as Africa and South America (i.e. 2009 African Union Convention for the Protection and Assistance of the Internally Displaced, 1969 African Union Convention Governing the Specific Aspects of Refugee Problems in Africa and 1984 Cartagena Declaration on Refugees [Americas]) (PEF 2010: 19).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, the red imported fire ant (Solenopsis invicta Buren) was identified in Brisbane, Australia. An eradication program involving broadcast bait treatment with two insect growth regulators and a metabolic inhibitor began in September of that year and is currently ongoing. To gauge the impacts of these treatments on local ant populations, we examined long-term monitoring data and quantified abundance patterns of S. invicta and common local ant genera using a linear mixed-effects model. For S. invicta, presence in pitfalls reduced over time to zero on every site. Significantly higher numbers of S. invicta workers were collected on high-density polygyne sites, which took longer to disinfest compared with monogyne and low-density polygyne sites. For local ants, nine genus groups of the 10 most common genera analyzed either increased in abundance or showed no significant trend. Five of these genus groups were significantly less abundant at the start of monitoring on high-density polygyne sites compared with monogyne and low-density polygyne sites. The genus Pheidole significantly reduced in abundance over time, suggesting that it was affected by treatment efforts. These results demonstrate that the treatment regime used at the time successfully removed S. invicta from these sites in Brisbane, and that most local ant genera were not seriously impacted by the treatment. These results have important implications for current and future prophylactic treatment efforts, and suggest that native ants remain in treated areas to provide some biological resistance to S. invicta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The human right to water has recently been recognised by both the United Nations General Assembly and the Human Rights Council. As the mining industry interacts with water on multiple levels, it is important that these interactions respect the human right to water. Currently, a disconnect exists between mine site water management practices and the recognition of water from a human rights perspective. The Minerals Council of Australia (MCA) Water Accounting Framework (WAF) has previously been used to strengthen the connection between water management and human rights. This article extends this connection through the use of a Social Water Assessment Protocol (SWAP). The SWAP is scoping tool consisting of a set of questions classified into taxonomic themes under leading topics with suggested sources of data that enable mine sites to better understand the local water context in which they operate. Three of the themes contained in the SWAP – gender, Indigenous peoples and health – are discussed to demonstrate how the protocol may be useful in assisting mining companies to consider their impacts on the human right to water.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review question/objective The objective of this review is to identify the effectiveness of surveillance systems and community-based interventions in identifying and responding to emerging and re-emerging zoonotic infections in Southeast Asia (SE Asia). More specifically the research questions are: 1. What is the effectiveness of community-based surveillance interventions designed to identify emerging zoonotic infectious diseases? 2. What is the effectiveness of non-pharmaceutical community-based interventions designed to prevent transmission of emerging zoonotic infectious diseases? 3. How do factors related to the emergence and management of emerging zoonotic infectious diseases impact the effectiveness of interventions designed to identify and respond to them?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Live migration of multiple Virtual Machines (VMs) has become an integral management activity in data centers for power saving, load balancing and system maintenance. While state-of-the-art live migration techniques focus on the improvement of migration performance of an independent single VM, only a little has been investigated to the case of live migration of multiple interacting VMs. Live migration is mostly influenced by the network bandwidth and arbitrarily migrating a VM which has data inter-dependencies with other VMs may increase the bandwidth consumption and adversely affect the performances of subsequent migrations. In this paper, we propose a Random Key Genetic Algorithm (RKGA) that efficiently schedules the migration of a given set of VMs accounting both inter-VM dependency and data center communication network. The experimental results show that the RKGA can schedule the migration of multiple VMs with significantly shorter total migration time and total downtime compared to a heuristic algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the frame as it contributes to the debate on contemporary intermedial theatre and performance practices in light of increasing astriction between filmic and theatrical discourses. Informed by Auslander (1999), Lehmann (2006), and Giesekam (2007), and through an extrapolation of the tenets Eckersall, Gretchen and Scheer identify in the theory of New Media Dramaturgy, it will analyse two recent works of experimental theatre-making. RUFF (2013), a New York produced solo performance by one of the world’s leading female performers, explores her experiences of having a stroke. Total Dik! (2013), produced in Brisbane, Australia, is an interdisciplinary collaborative performance that examines aspects of dictatorship. They are clearly very different works yet there are a number of significant theatrical similarities in their use of Chroma Key technology and live compositing as material scenic devices. These works overtly and evocatively draw on the cinematic technique and technology of Chroma Key to augment and reveal the tensions and overlaps in their production processes.