858 resultados para Security issues
Resumo:
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality over wired networks and Wireless Transport Layer Security (WTLS) between a wireless device and a Wireless Application Protocol (WAP) gateway. The paper presents our analysis of security properties in the proposed protocols using formal method tools: Casper and FDR2. We also highlight issues concerning payment security in the proposed protocols.
Resumo:
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.
Resumo:
The Australasian Information Security Conference (AISC) 2011 was held on 18th-19th January 2011 in Perth, Australia, as a part of the Australasian Computer Science Week 2011. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for Australasian and other researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
The Australasian Information Security Conference (AISC) 2012 was held at RMIT University in Melbourne, Australia, as a part of the Australasian Computer Science Week, January 30 - February 3, 2012. AISC grew out of the Australasian Information Security Workshop and officially changed the name to Australasian Information Security Conference in 2008. The main aim of the AISC is to provide a venue for researchers to present their work on all aspects of information security and promote collaboration between academic and industrial researchers working in this area.
Resumo:
Executive summary of Report examining definitions of fundraising and formal Australian accounting standards to ascertain their impact on reporting fundraising transactions by not-for-profit entities.
Resumo:
The main issues related to control of energy and matter in hierarchical low-temperature plasma-solid systems used in nanoscale synthesis and processing are critically examined. A conceptual approach to identify the most effective carriers and transport mechanisms of energy and matter at the nano- and subnanometer scales in plasma-aided nanofabrication is proposed. This approach is highly relevant to the envisaged energy- and matter-efficient plasma-based production of the next-generation advanced nanomaterials for applications in the energy, environment, food, water, health, and security technologies critically needed for a sustainable future.
Resumo:
This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.
Resumo:
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(logn) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Ω(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(logn) bits per multiply at the cost of a reasonable assumption on RSA inversion.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Cities in the 21st century have become layered and complex systems not only in terms of physical form, but also social and cultural structure. Consolidated tools to analyze the urban environment have today to be improved including a strong interdisciplinary perspective in order to understand and manage the unprecedented complexity our cities are facing. Redevelopments, new estates, internal and external migrations are all dynamics which are deeply modifying the built environment directly or indirectly also affecting local identity, culture and social structure. This paper investigates the relationship between urban form and social behaviors, with particular attention to the perception of the built environment and its use by long term residents, recent migrants as well as tourists. A comparative study is suggested between South East Queensland and Florida; this two regions share common features such as subtropical climate, similar lifestyle, leisure cities and canal estates. Neighborhoods on the Gold and Sunshine Coasts have been designed using the communities of Florida, such as Celebration or Seaside, as models. These regions share also significant migration processes, similar social problems and high crime rates, which directly affect the local economies. Comparing Florida and SEQ could provide an understanding of different strategies adopted and how urban development and lifestyle can be managed maintaining social equity and security. This study, investigates people’s perception of built form and how this affects the use of public space. The relationship between built environment and social behaviour has been previously investigated, for example by environmental psychology; the innovation proposed by this research is to study the perception of place in leisure cities at multiple levels. Locals, migrants and tourists have different understanding of the built form in the same location; this understanding affects the use of space and the attitude to visit or avoid some precincts. The research methodology integrates traditional morpho-typological investigations with qualitative methods; data are collected in the first phase through online surveys about perception of urban forms. Findings guide then the selection of neighbourhoods to be investigated in detail through questionnaires and Nolli maps, specifying morphological regions as well as recurrent building typologies. A final phase includes interviews with selected stakeholders. Major urban projects are discussed addressing how they are used and perceived by locals, migrants or tourists; the comparison between SEQ and Florida allows the identification of strategies to address migration issues in both regions with particular attention to urban form and placemaking dynamics.
Resumo:
Three proof requirements as essential for a sustainable land registration system. These were proof of identity, proof of ownership, and authority to deal. Our attention in this paper is drawn to the latter two requirements and will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to proof of ownership and authority to deal. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
Conceptually, the management of safety at roadworks can be seen in a three level framework. At the regulatory level, roadworks operate at the interface between the work environment, governed by workplace health and safety regulations, and the road environment, which is subject to road traffic regulations and practices. At the organizational level, national, state and local governments plan and purchase road construction and maintenance which are then delivered in-house or tendered out to large construction companies who often subcontract multiple smaller companies to supply services and labor. At the operational level, roadworks are difficult to isolate from the general public, hindering effective occupational health and safety controls. This study, from the State of Queensland, Australia, examines how well this tripartite framework functions. It includes reviews of organizational policy and procedures documents; interviews with 24 subject matter experts from various road construction and maintenance organizations, and on-site interviews with 66 road construction personnel. The study identified several factors influencing the translation of safety policies into practice including the cost of safety measures in the context of competitive tendering, lack of firm evidence of the effectiveness of safety measures, and pressures to minimize disruption to the travelling public.
Resumo:
The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.