968 resultados para Steinle, Edward vonSteinle, Edward vonEdwardSteinlevon
Resumo:
In this paper we investigate the heuristic construction of bijective s-boxes that satisfy a wide range of cryptographic criteria including algebraic complexity, high nonlinearity, low autocorrelation and have none of the known weaknesses including linear structures, fixed points or linear redundancy. We demonstrate that the power mappings can be evolved (by iterated mutation operators alone) to generate bijective s-boxes with the best known tradeoffs among the considered criteria. The s-boxes found are suitable for use directly in modern encryption algorithms.
Resumo:
In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users’ operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user’s legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.
Resumo:
Variable Speed Limits (VSL) is an Intelligent Transportation Systems (ITS) control tool which can enhance traffic safety and which has the potential to contribute to traffic efficiency. Queensland's motorways experience a large volume of commuter traffic in peak periods, leading to heavy recurrent congestion and a high frequency of incidents. Consequently, Queensland's Department of Transport and Main Roads have considered deploying VSL to improve safety and efficiency. This paper identifies three types of VSL and three applicable conditions for activating VSL on for Queensland motorways: high flow, queuing and adverse weather. The design objectives and methodology for each condition are analysed, and micro-simulation results are presented to demonstrate the effectiveness of VSL.
Resumo:
Eco-driving is an initiative driving behavior which aims to reduce fuel consumption and emissions from automobiles. Recently, it has attracted increasing interests and has been adopted by many drivers in Australia. Although many of the studies have revealed considerable benefits in terms of fuel consumption and emissions after utilising eco-driving, most of the literature investigated eco-driving effects on individual driver but not traffic flow. The driving behavior of eco-drivers will potentially affect other drivers and thereby affects the entire traffic flow. To comprehensively assess and understand how effectively eco-driving can perform, therefore, measurement on traffic flow is necessary. In this paper, we proposed and demonstrated an evaluation method based on a microscopic traffic simulator (Aimsun). We focus on one particular eco-driving style which involves moderate and smooth acceleration. We evaluated both traffic performance (travel time) and environmental performance (fuel consumption and CO2 emission) at traffic intersection level in a simple simulation model. The before-and-after comparisons indicated potentially negative impacts when using eco-driving, which highlighted the necessity to carefully evaluate and improve eco-driving before wide promotion and implementation.
Resumo:
In dynamic and uncertain environments, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. Risk-based approaches to access control attempt to address this problem by allocating a limited budget to users, through which they pay for the exceptions deemed necessary. So far the primary focus has been on how to incorporate the notion of budget into access control rather than what or if there is an optimal amount of budget to allocate to users. In this paper we discuss the problems that arise from a sub-optimal allocation of budget and introduce a generalised characterisation of an optimal budget allocation function that maximises organisations expected benefit in the presence of self-interested employees and costly audit.
Resumo:
Intermediaries have introduced electronic services with varying success. One of the problems an intermediary faces is deciding what kind of exchange service it should offer to its customers and suppliers. For example, should it only provide a catalogue or should it also enable customers to order products? Developing the right exchange design is a complex undertaking because of the many design options on the one hand and the interests of multiple actors to be considered on the other. This is far more difficult than simple prescriptions like ‘creating a win-win situation’ suggest. We address this problem by developing design patterns for the exchanges between customers, intermediary, and suppliers related to role, linkage, transparency, and ovelty choices. For developing these design patterns, we studied four distinct electronic intermediaries and dentified exchange design choices that require trade-offs relating to the interests of customers, intermediary, and suppliers. The exchange design patterns contribute to the development of design theory for electronic intermediaries by filling a gap between basic business models and detailed business process designs.