958 resultados para Key management


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to such processes is unclear. Using ten data sets, ranging from 3 to 14 years, we investigate the lag between restoration and the establishment of phytophagous beetle assemblages typical of species rich grasslands. We used traits and ecological characteristics to determine factors limiting beetle colonisation, and also considered how food-web structure changed during restoration. For sites where seed addition of host-plants occurred the success in replicating beetle assemblages increased over time following a negative exponential function. Extrapolation beyond the existing data set tentatively suggested that success would plateau after 20 years, representing a c. 60% increase in assemblage similarity to target grasslands. In the absence of seed addition, similarity to the target grasslands showed no increase over time. Where seed addition was used the connectance of plant-herbivore food webs decreased over time, approaching values typical of species rich grasslands after c. 7 years. This trend was, however, dependent on the inclusion of a single site containing data in excess of 6 years of restoration management. Beetles not capable of flight, those showing high degrees of host-plant specialisation and species feeding on nationally rare host plants take between 1 and 3 years longer to colonise. Successful grassland restoration is underpinned by the establishment of host-plants, although individual species traits compound the effects of poor host-plant establishment to slow colonisation. The use of pro-active grassland restoration to mitigate against future environmental change should account for lag periods in excess of 10 years if the value of these habitats is to be fully realised.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to the successful enhancement of native biodiversity is unclear. Using two long term data sets, we investigate differences in successional trajectories during the establishment of butterfly (11 years) and phytophagous beetle (13 years) communities during the recreation of calcareous grassland. Overall restoration success was higher for the butterflies than the beetles. However, both shared a general pattern of rapidly increasing restoration success over the first five years, awhich approached an asymptote after c. 10 years. The use of pro-active grassland restoration to mitigate against future environmental change therefore needs to account for such time lag if the value of these habitats is to be fully realised.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper, I examine some of the key management literature of the neoliberal 1990s to make a series of wider observations about contemporary ideology. Post-structuralist or post-modernist theory is often presented as the arch-enemy of neoliberal capitalism, as the orthodoxy of late capitalism. However, adding to work by Frederic Jameson, Thomas Frank and others, this paper examines uncanny proximity between neoliberal ideas about disaggregating, outsourcing, networking, etc. and the learning motifs of postmodernist theory. Its guiding hypothesis is that postmodernism in the academy, despite its own self-misrecognition as "racial", is a further ideological expression of the samr neoliberal drive to overcome "Fordist", "authoritarian" ways of organising producation and social regulation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Through extensive laboratory and field based analysis of soil chemical and physical processes, this research identified and addressed key management issues associated with the sustainable irrigation of municipal wastewater onto sandy water repellent soils, overlaying a shallow aquifer, in an environmentally significant coastal system.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Across time, companies are increasingly making public commitments to sustainable development and to reducing their impacts on climate change. Management remuneration plans (MRPs) are a key mechanism to motivate managers to achieve corporate goals. We review the MRPs negotiated with key management personnel in a sample of large Australian carbon-intensive companies. Our results show that, as in past decades, the companies in our sample have MRPs in place that continue to fixate on financial performance. We argue that this provides evidence of a disconnection between the sustainability-related rhetoric of the sample companies, and their ‘real’ organisational priorities.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In dynamic peer to peer (P2P) e-commerce, it is an important and difficult problem to promote online businesses without sacrificing the desired trust to secure transactions. In this paper, we address malicious threats in order to guarantee secrecy and integrity of recommendations exchanged among peers in P2P e-commerce. In addition to trust, secret keys are required to be established between each peer and its neighbors. Further, we propose a key management approach gkeying to generate six types of keys. Our work mainly focuses on key generation for securing recommendations, and ensuring the integrity of recommendations. The proposed approach presented with a security and performance analysis, is more secure and more efficient in terms of communication cost, computation cost, storage cost, and feasibility. © 2012 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbitrary identity string as an encryption key. Since IBE does not require prior generation and distribution of keys, it greatly simplifies key management in public-key cryptography. According to the Menezes-Okamoto-Vanstone (MOV) reduction theory, the IBE scheme based on bilinear map loses the high efficiency of elliptic curve because of the requirement of large security parameters. Therefore, it is important to build a provably secure IBE scheme without bilinear map. To this end, this paper proposes an improved IBE scheme that is different from the previous schemes because this new scheme does not use symmetric encryption algorithm. Furthermore, it can be proven to be secure against adaptively chosen identity and chosen plaintext attacks in the standard model. Elaborated security and performance analysis demonstrate that this new scheme outperforms the previous ones in terms of the time complexity for encryption and decryption.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La extrema competitividad derivada de la globalización, hace que los proyectos en Tecnologías de la Información (TI), no se valoren por si son buenos o malos. Se da por supuesto que el producto tecnológico es innovador, aporta un valor añadido y tiene un fundamento tecnológico sólido y bien construido. Europa es un gran exponente en Desarrollo e Investigación (I+D), pero todavía está por detrás de países como Estados Unidos o Japón en cuanto a Innovación (i). Nos falta conseguir llegar al mercado. No basta con conseguir con éxito una prueba de concepto. Hay que ir más allá. Partimos de la base de un proyecto: Secretify, un cliente de correo web multicuenta sencillo y atractivo que permite a los usuarios cifrar sus comunicaciones utilizando cuentas de correo electrónico ya existentes, sin la necesidad de saber nada sobre seguridad, criptografía o gestión de claves. La finalidad de este Trabajo es aplicar todos los conceptos aprendidos durante el Máster (en concreto en la rama de Gestión, Innovación y Negocio TI), para convertir Secretify en un producto que sacar al mercado con éxito, teniendo los conocimientos tanto técnicos como empresariales, para minimizar los riesgos y adecuarse al mercado.---ABSTRACT---The extreme competitiveness derived from globalization, makes projects in Information Technologies (IT) to not be evaluated for its goodness. It is assumed that the technology product is innovative, provides added value and has a solid technology basis and well constructed. Europe is a great exponent in Research & Development (R&D), but It is still far behind from countries like USA or Japan in terms of Innovation (i). We need to reach the market: it is not enough having a successful proof of concept. We must go further. We start from a project: Secretify, a simple and beautiful web-based multiaccount email client that allow users to cypher their communications using already existing email accounts, without the need to know about security, cryptography or key management. The purpose of this thesis is to apply all concepts learnt during the Master course (specifically in Management, Innovation and IT business), to turn Secretify into a successful market launch, having the technical and business knowledges, in order to reduce the risks and to adapt to the market.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The rapid growth of emerging markets’ multinational companies (MNCs) is a recent phenomenon and, as such, their nature and structure of key management processes, functions, and roles need further examination. While an abundance of low-cost labor is often the starting point of competitive advantage for many of the emerging markets’ MNCs, it is the optimum configuration of people, processes, and technology that defines how they leverage their intangible resources. Based on case studies of four Indian IT services MNCs, involving 51 in-depth interviews of business and human resource (HR) leaders at the corporate and subsidiary levels, we identify five key HR roles—namely, strategic business partner, guardian of culture, builder of global workforce and capabilities, champion of processes, and facilitator of employee development. The analysis also highlights that the HR function in Indian IT service MNCs faces several challenges in consolidating the early gains of internationalization, such as lack of decentralized decision making, developing a global mind-set, localization of the workforce, and developing a global leadership pipeline. Based on our exploratory findings, we propose a framework outlining the global HR roles pursued by emerging IT services MNCs, the factors influencing them, and the challenges facing their HR function for future research.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tropical coastal marine ecosystems including mangroves, seagrass beds and coral reef communities are undergoing intense degradation in response to natural and human disturbances, therefore, understanding the causes and mechanisms present challenges for scientist and managers. In order to protect our marine resources, determining the effects of nutrient loads on these coastal systems has become a key management goal. Data from monitoring programs were used to detect trends of macroalgae abundances and develop correlations with nutrient availability, as well as forecast potential responses of the communities monitored. Using eight years of data (1996–2003) from complementary but independent monitoring programs in seagrass beds and water quality of the Florida Keys National Marine Sanctuary (FKNMS), we: (1) described the distribution and abundance of macroalgae groups; (2) analyzed the status and spatiotemporal trends of macroalgae groups; and (3) explored the connection between water quality and the macroalgae distribution in the FKNMS. In the seagrass beds of the FKNMS calcareous green algae were the dominant macroalgae group followed by the red group; brown and calcareous red algae were present but in lower abundance. Spatiotemporal patterns of the macroalgae groups were analyzed with a non-linear regression model of the abundance data. For the period of record, all macroalgae groups increased in abundance (Abi) at most sites, with calcareous green algae increasing the most. Calcareous green algae and red algae exhibited seasonal pattern with peak abundances (Φi) mainly in summer for calcareous green and mainly in winter for red. Macroalgae Abi and long-term trend (mi) were correlated in a distinctive way with water quality parameters. Both the Abi and mi of calcareous green algae had positive correlations with NO3−, NO2−, total nitrogen (TN) and total organic carbon (TOC). Red algae Abi had a positive correlation with NO2−, TN, total phosphorus and TOC, and the mi in red algae was positively correlated with N:P. In contrast brown and calcareous red algae Abi had negative correlations with N:P. These results suggest that calcareous green algae and red algae are responding mainly to increases in N availability, a process that is happening in inshore sites. A combination of spatially variable factors such as local current patterns, nutrient sources, and habitat characteristics result in a complex array of the macroalgae community in the seagrass beds of the FKNMS.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2016.