922 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The emergence of a sensor-networked world produces a clear and urgent need for well-planned, safe and secure software engineering. It is the role of universities to prepare graduates with the knowledge and experience to enter the work-force with a clear understanding of software design and its application to the future safety of computing. The snBench (Sensor Network WorkBench) project aims to provide support to the programming and deployment of Sensor Network Applications, enabling shared sensor embedded spaces to be easily tasked with various sensory applications by different users for simultaneous execution. In this report we discus our experience using the snBench research project as the foundation for semester-long project in a graduate level software engineering class at Boston University (CS511).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cross-cultural variations in conceptions of childhood are discussed, particularly with regard to child abuse and child labour. Regardless of cultural background, a universal minimum standard of child rearing is required. The street child literature is reviewed, culminating in an analysis of Ethiopian street children. Theoretically this work is informed by victimology. Concepts shared by victimology and rational choice perspective are discussed, after Fattah (1993a). Victim surveys are described, highlighting their accuracy of crime estimates. Juvenile prostitution, runaways and rape are examined, particularly with regard to their relevance in Addis Ababa. Fifty five male and 135 female street children were interviewed. Interviews with boys focused on delinquency. An age-related pattern emerged, with younger boys less likely to drink, chew khat, steal or be sexually active. Interviews with street girls focused on the differences between girls living on the streets (girls of the street), girls working on the streets (girls on the street) and a sample of homebased girls. Girls of the street come to the street come to the streets for many reasons. Conflicts with a parent or guardian account for almost 50%. They are highly vulnerable to sexual assaults, particularly those 43% who have worked as prostitutes. Girls on the street experience considerably less victimisation. Urban poor girls live in socio-economic circumstances akin to girls on the street but enjoy almost universal protection from victimisation because they do not spend time on the streets. Unprotected by the stability which a family provides, girls of the street experience high victimisation levels. Such victimisation is often the result of reliance on types of work, such as prostitution, which brings the girls into contact with exploitative adults. Resistance to such victimisation is provided by a secure place to sleep, companions, and relatively safe types of work. Such protective factors are more readily available to family based children as compared to those living independently.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the rapid growth of the Internet and digital communications, the volume of sensitive electronic transactions being transferred and stored over and on insecure media has increased dramatically in recent years. The growing demand for cryptographic systems to secure this data, across a multitude of platforms, ranging from large servers to small mobile devices and smart cards, has necessitated research into low cost, flexible and secure solutions. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. This thesis investigates flexible hardware architectures for the main components of a cryptographic system. Dedicated hardware accelerators can provide significant performance improvements when compared to implementations on general purpose processors. Each of the designs proposed are analysed in terms of speed, area, power, energy and efficiency. Field Programmable Gate Arrays (FPGAs) are chosen as the development platform due to their fast development time and reconfigurable nature. Firstly, a reconfigurable architecture for performing elliptic curve point scalar multiplication on an FPGA is presented. Elliptic curve cryptography is one such method to secure data, offering similar security levels to traditional systems, such as RSA, but with smaller key sizes, translating into lower memory and bandwidth requirements. The architecture is implemented using different underlying algorithms and coordinates for dedicated Double-and-Add algorithms, twisted Edwards algorithms and SPA secure algorithms, and its power consumption and energy on an FPGA measured. Hardware implementation results for these new algorithms are compared against their software counterparts and the best choices for minimum area-time and area-energy circuits are then identified and examined for larger key and field sizes. Secondly, implementation methods for another component of a cryptographic system, namely hash functions, developed in the recently concluded SHA-3 hash competition are presented. Various designs from the three rounds of the NIST run competition are implemented on FPGA along with an interface to allow fair comparison of the different hash functions when operating in a standardised and constrained environment. Different methods of implementation for the designs and their subsequent performance is examined in terms of throughput, area and energy costs using various constraint metrics. Comparing many different implementation methods and algorithms is nontrivial. Another aim of this thesis is the development of generic interfaces used both to reduce implementation and test time and also to enable fair baseline comparisons of different algorithms when operating in a standardised and constrained environment. Finally, a hardware-software co-design cryptographic architecture is presented. This architecture is capable of supporting multiple types of cryptographic algorithms and is described through an application for performing public key cryptography, namely the Elliptic Curve Digital Signature Algorithm (ECDSA). This architecture makes use of the elliptic curve architecture and the hash functions described previously. These components, along with a random number generator, provide hardware acceleration for a Microblaze based cryptographic system. The trade-off in terms of performance for flexibility is discussed using dedicated software, and hardware-software co-design implementations of the elliptic curve point scalar multiplication block. Results are then presented in terms of the overall cryptographic system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Inclusive education is central to contemporary discourse internationally reflecting societies’ wider commitment to social inclusion. Education has witnessed transforming approaches that have created differing distributions of power, resource allocation and accountability. Multiple actors are being forced to consider changes to how key services and supports are organised. This research constitutes a case study situated within this broader social service dilemma of how to distribute finite resources equitably to meet individual need, while advancing inclusion. It focuses on the national directive with regard to inclusive educational practice for primary schools, Department of Education and Science Special Education Circular 02/05, which introduced the General Allocation Model (GAM) within the legislative context of the Education of Persons with Special Educational Needs (EPSEN) Act (Government of Ireland, 2004). This research could help to inform policy with ‘facts about what is happening on the ground’ (Quinn, 2013). Research Aims: The research set out to unearth the assumptions and definitions embedded within the policy document, to analyse how those who are at the coalface of policy, and who interface with multiple interests in primary schools, understand the GAM and respond to it, and to investigate its effects on students and their education. It examines student outcomes in the primary schools where the GAM was investigated. Methods and Sample The post-structural study acknowledges the importance of policy analysis which explicitly links the ‘bigger worlds’ of global and national policy contexts to the ‘smaller worlds’ of policies and practices within schools and classrooms. This study insists upon taking the detail seriously (Ozga, 1990). A mixed methods approach to data collection and analysis is applied. In order to secure the perspectives of key stakeholders, semi-structured interviews were conducted with primary school principals, class teachers and learning support/resource teachers (n=14) in three distinct mainstream, non-DEIS schools. Data from the schools and their environs provided a profile of students. The researcher then used the Pobal Maps Facility (available at www.pobal.ie) to identify the Small Area (SA) in which each student resides, and to assign values to each address based on the Pobal HP Deprivation Index (Haase and Pratschke, 2012). Analysis of the datasets, guided by the conceptual framework of the policy cycle (Ball, 1994), revealed a number of significant themes. Results: Data illustrate that the main model to support student need is withdrawal from the classroom under policy that espouses inclusion. Quantitative data, in particular, highlighted an association between segregated practice and lower socioeconomic status (LSES) backgrounds of students. Up to 83% of the students in special education programmes are from lower socio-economic status (LSES) backgrounds. In some schools 94% of students from LSES backgrounds are withdrawn from classrooms daily for special education. While the internal processes of schooling are not solely to blame for class inequalities, this study reveals the power of professionals to order children in school, which has implications for segregated special education practice. Such agency on the part of key actors in the context of practice relates to ‘local constructions of dis/ability’, which is influenced by teacher habitus (Bourdieu, 1984). The researcher contends that inclusive education has not resulted in positive outcomes for students from LSES backgrounds because it is built on faulty assumptions that focus on a psycho-medical perspective of dis/ability, that is, placement decisions do not consider the intersectionality of dis/ability with class or culture. This study argues that the student need for support is better understood as ‘home/school discontinuity’ not ‘disability’. Moreover, the study unearths the power of some parents to use social and cultural capital to ensure eligibility to enhanced resources. Therefore, a hierarchical system has developed in mainstream schools as a result of funding models to support need in inclusive settings. Furthermore, all schools in the study are ‘ordinary’ schools yet participants acknowledged that some schools are more ‘advantaged’, which may suggest that ‘ordinary’ schools serve to ‘bury class’ (Reay, 2010) as a key marker in allocating resources. The research suggests that general allocation models of funding to meet the needs of students demands a systematic approach grounded in reallocating funds from where they have less benefit to where they have more. The calculation of the composite Haase Value in respect of the student cohort in receipt of special education support adopted for this study could be usefully applied at a national level to ensure that the greatest level of support is targeted at greatest need. Conclusion: In summary, the study reveals that existing structures constrain and enable agents, whose interactions produce intended and unintended consequences. The study suggests that policy should be viewed as a continuous and evolving cycle (Ball, 1994) where actors in each of the social contexts have a shared responsibility in the evolution of education that is equitable, excellent and inclusive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the field of embedded systems design, coprocessors play an important role as a component to increase performance. Many embedded systems are built around a small General Purpose Processor (GPP). If the GPP cannot meet the performance requirements for a certain operation, a coprocessor can be included in the design. The GPP can then offload the computationally intensive operation to the coprocessor; thus increasing the performance of the overall system. A common application of coprocessors is the acceleration of cryptographic algorithms. The work presented in this thesis discusses coprocessor architectures for various cryptographic algorithms that are found in many cryptographic protocols. Their performance is then analysed on a Field Programmable Gate Array (FPGA) platform. Firstly, the acceleration of Elliptic Curve Cryptography (ECC) algorithms is investigated through the use of instruction set extension of a GPP. The performance of these algorithms in a full hardware implementation is then investigated, and an architecture for the acceleration the ECC based digital signature algorithm is developed. Hash functions are also an important component of a cryptographic system. The FPGA implementation of recent hash function designs from the SHA-3 competition are discussed and a fair comparison methodology for hash functions presented. Many cryptographic protocols involve the generation of random data, for keys or nonces. This requires a True Random Number Generator (TRNG) to be present in the system. Various TRNG designs are discussed and a secure implementation, including post-processing and failure detection, is introduced. Finally, a coprocessor for the acceleration of operations at the protocol level will be discussed, where, a novel aspect of the design is the secure method in which private-key data is handled

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis explores the inter-related attempts to secure the legitimation of risk and democracy with regard to Bt cotton, a genetically modified crop, in the state of Andhra Pradesh in India. The research included nine months of ethnographic fieldwork, extensive library and newspaper research, as well as university attendance in India, undertaken between June, 2010 and March, 2011. This comparative study (involving organic, NPM and Bt cotton cultivation) was conducted in three villages in Telangana, a region which was granted secession from Andhra Pradesh in July, 2013, and in Hyderabad, the state capital. Andhra Pradesh is renowned for its agrarian crisis and farmer suicides, as well as for the conflict which Bt cotton represents. This study adopts the categories of legitimation developed by Van Leeuwen (2007; 2008) in order to explore the theory of risk society (Beck, 1992; 1994; 1999; 2009), and the Habermasian (1996: 356-366) core-periphery model as means of theoretically analysing democratic legitimacy. The legitimation of risk and democracy in relation to Bt cotton refers to normative views on the way in which power should be exercised with regard to risk differentiation, construction and definition. The analysis finds that the more legitimate the exercise of power, the lower the exposure to risk as a concern for the collective. This also has consequences for the way in which resources are distributed, knowledge constructed, and democratic praxis institutionalised as a concern for social and epistemic justice. The thesis argues that the struggle to legitimate risk and democracy has implications not only for the constitution of the new state of Telangana and the region’s development, but also for the emergence of global society and the future development of humanity as a whole.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In rural Ethiopia, among other things, lack of adequate financial service is considered as the basic problem to alleviate rural poverty and to solve the problem of food insecurity. Commercial banks are restricted to urban centres. Providing rural financial service through RUSACCO to the poor has been proposed as a tool for economic development and for achieving food security. Evidence from research in this regard has been so far scanty, especially in rural Ethiopia. The aims of this study are to analyze the determinants of membership, to identify socioeconomic and demographic factors that influence members’ participation in RUSACCOs and to quantify the impact of RUSACCOs on member households’ food security. The study was conducted in two purposely selected woredas in the Amhara region one from food insecure (Lay Gayint woreda) and the other from food secure (Dejen woreda). Six RUSACCOs were selected randomly from these two woredas. Both qualitative and quantitative data were collected. Key informant interviews, focus group discussions and survey techniques were used to collect primary data. Collected data was then analyzed using mixed methods depending on the nature of data. For quantitative data analysis appropriate statistical models were used. The study result reveals that the number of members in each RUSACCO is very small. However, the majority of non-member respondents are willing to join RUSACCO. Lack of information about the benefits of RUSACCO membership is the main problem why many rural poor do not join RUSACCOs. Members participate in different aspects of the cooperatives, starting from attending general assembly up to board membership. They also participate actively in saving and borrowing activities of RUSACCO. The majority of the respondents believe the RUSACCO is a vital instrument in combating food insecurity. The empirical findings indicate that gender, marital status, occupation, educational level, participation in local leadership and participation in other income generation means determine the decision of rural poor to join a RUSACCO or not. The amount of saving is determined by household head occupation, farming experience and income level. While age of household head, primary occupation, farming experience, date of membership, annual total consumption expenditure, amount of saving and participation in other income generation activities influence members’ amount of borrowing by RUSACCO members. Finally, the study confirms that RUSACCO participation improves household food security. RUSACCO membership has made positive impact on household total consumption expenditure and food expenditure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Open environments involve distributed entities interacting with each other in an open manner. Many distributed entities are unknown to each other but need to collaborate and share resources in a secure fashion. Usually resource owners alone decide who is trusted to access their resources. Since resource owners in open environments do not have a complete picture of all trusted entities, trust management frameworks are used to ensure that only authorized entities will access requested resources. Every trust management system has limitations, and the limitations can be exploited by malicious entities. One vulnerability is due to the lack of globally unique interpretation for permission specifications. This limitation means that a malicious entity which receives a permission in one domain may misuse the permission in another domain via some deceptive but apparently authorized route; this malicious behaviour is called subterfuge. This thesis develops a secure approach, Subterfuge Safe Trust Management (SSTM), that prevents subterfuge by malicious entities. SSTM employs the Subterfuge Safe Authorization Language (SSAL) which uses the idea of a local permission with a globally unique interpretation (localPermission) to resolve the misinterpretation of permissions. We model and implement SSAL with an ontology-based approach, SSALO, which provides a generic representation for knowledge related to the SSAL-based security policy. SSALO enables integration of heterogeneous security policies which is useful for secure cooperation among principals in open environments where each principal may have a different security policy with different implementation. The other advantage of an ontology-based approach is the Open World Assumption, whereby reasoning over an existing security policy is easily extended to include further security policies that might be discovered in an open distributed environment. We add two extra SSAL rules to support dynamic coalition formation and secure cooperation among coalitions. Secure federation of cloud computing platforms and secure federation of XMPP servers are presented as case studies of SSTM. The results show that SSTM provides robust accountability for the use of permissions in federation. It is also shown that SSAL is a suitable policy language to express the subterfuge-safe policy statements due to its well-defined semantics, ease of use, and integrability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the tension between patent rights and the right to health and it recognizes patent rights on pharmaceutical products as one of the factors responsible for the problem of lack of access to affordable medicines in developing countries. The thesis contends that, in order to preserve their patent policy space and secure access to affordable medicines for their citizens, developing countries should incorporate a model of human rights into the design, implementation, interpretation, and enforcement of their national patent laws. The thesis provides a systematic analysis of court decisions from four key developing countries (Brazil, India, Kenya, and South Africa) and it assesses how the national courts in these countries resolve the tension between patent rights and the right to health. Essentially, this thesis demonstrates how a model of human rights can be incorporated into the adjudication of disputes involving patent rights in national courts. Focusing specifically on Brazil, the thesis equally demonstrates how policy makers and law makers at the national level can incorporate a model of human rights into the design or amendment of their national patent law. This thesis also contributes to the ongoing debate in the field of business and human rights with regard to the mechanisms that can be used to hold corporate actors accountable for their human rights responsibilities. This thesis recognizes that, while states bear the primary responsibility to respect, protect, and fulfil the right to health, corporate actors such as pharmaceutical companies also have a baseline responsibility to respect the right to health. This thesis therefore contends that pharmaceutical companies that own patent rights on pharmaceutical products can be held accountable for their right to health responsibilities at the national level through the incorporation of a model of civic participation into a country’s patent law system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the most striking features of the 1998 Aarhus Convention on Access to Information, Public Participation in Decision-making and Access to Justice in Environmental Matters is the leading role envisaged for environmental nongovernmental organisations (ENGOs) in furthering compliance with environmental law. The Convention aims to secure the special status of ENGOs in environmental governance procedures by guaranteeing procedural rights of access to information, participation in decision-making and access to review mechanisms. Although Ireland did not become a Party to the Convention until September 2012, the Aarhus procedural rights were already guaranteed under European Union (EU) law. The EU has been a Party to the Aarhus Convention since May 2005 and has adopted a number of legislative measures to implement the Convention. This thesis examines the evolving role of ENGOs in environmental governance in Ireland. It provides a doctrinal analysis of the impact of the Aarhus Convention and EU law on Irish law and governance arrangements involving ENGOs. The thesis considers the extent to which Ireland has delivered faithfully on the standards set by the Aarhus Convention to facilitate ENGOs to fulfil the role envisaged for them under the Convention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: Strict lifelong compliance to a gluten-free diet (GFD) minimizes the long-term risk of mortality, especially from lymphoma, in adult celiac disease (CD). Although serum IgA antitransglutaminase (IgA-tTG-ab), like antiendomysium (IgA-EMA) antibodies, are sensitive and specific screening tests for untreated CD, their reliability as predictors of strict compliance to and dietary transgressions from a GFD is not precisely known. We aimed to address this question in consecutively treated adult celiacs. METHODS: In a cross-sectional study, 95 non-IgA deficient adult (median age: 41 yr) celiacs on a GFD for at least 1 yr (median: 6 yr) were subjected to 1) a dietician-administered inquiry to pinpoint and quantify the number and levels of transgressions (classified as moderate or large, using as a cutoff value the median gluten amount ingested in the overall noncompliant patients of the series) over the previous 2 months, 2) a search for IgA-tTG-ab and -EMA, and 3) perendoscopic duodenal biopsies. The ability of both antibodies to discriminate celiacs with and without detected transgressions was described using receiver operating characteristic curves and quantified as to sensitivity and specificity, according to the level of transgressions. RESULTS: Forty (42%) patients strictly adhered to a GFD, 55 (58%) had committed transgressions, classified as moderate (< or = 18 g of gluten/2 months; median number 6) in 27 and large (>18 g; median number 69) in 28. IgA-tTG-ab and -EMA specificity (proportion of correct recognition of strictly compliant celiacs) was 0.97 and 0.98, respectively, and sensitivity (proportion of correct recognition of overall, moderate, and large levels of transgressions) was 0.52, 0.31, and 0.77, and 0.62, 0.37, and 0.86, respectively. IgA-tTG-ab and -EMA titers were correlated (p < 0.001) to transgression levels (r = 0.560 and R = 0.631, respectively) and one to another (p < 0.001) in the whole patient population (r = 0.834, N = 84) as in the noncompliant (r = 0.915, N = 48) group. Specificity and sensitivity of IgA-tTG-ab and IgA-EMA for recognition of total villous atrophy in patients under a GFD were 0.90 and 0.91, and 0.60 and 0.73, respectively. CONCLUSIONS: In adult CD patients on a GFD, IgA-tTG-ab are poor predictors of dietary transgressions. Their negativity is a falsely secure marker of strict diet compliance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract The transition from trainee to junior faculty member can be both exciting and daunting. However, a paucity of medical literature exists to help guide new faculty in this transition. Therefore, we adapted work from the business management literature on what is referred to as "on-boarding"; effectively integrating and advancing one's position as a new employee. This article outlines strategies for cultivating one's own on-boarding as a junior faculty member at large academic medical centers. These strategies are extrapolated from management practices, culled from the medical literature on developing and retaining junior faculty, and, finally, borrowed from the hard-won knowledge of junior and senior faculty members. They advise new faculty to: (1) start early, (2) define your role--"managing yourself," (3) invest in/secure early wins, (4) manage your manager, (5) identify the "true (or hidden)" organizational culture, (6) reassess your own goals--"look in the rearview mirror and to the horizon," and (7) use your mentors effectively. These strategies provide a roadmap for new faculty members to transition as effectively as possible to their new jobs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cigarette smuggling reduces the price of cigarettes, thwarts youth access restrictions, reduces government revenue, and undercuts the ability of taxes to reduce consumption. The tobacco industry often opposes increases to tobacco taxes on the claim that greater taxes induce more smuggling. To date, little is known about the magnitude of smuggling in the Philippines. his information is necessary to effectively address illicit trade and to measure the impacts of tax changes and the introduction of secure tax markings on illicit trade. This study employs two gap discrepancy methods to estimate the magnitude of illicit trade in cigarettes for the Philippines between 1994 and 2009. First, domestic consumption is compared with tax-paid sales to measure the consumption of illicit cigarettes. Second, imports recorded by the Philippines are compared with exports to the Philippines by trade partners to measure smuggling. Domestic consumption fell short of tax-paid sales for all survey years. The magnitude of these differences and a comparison with a prevalence survey for 2009 suggest a high level of survey under-reporting of smoking. In the late 1990s and the mid 2000s, the Philippines experienced two sharp declines in trade discrepancies, from a high of $750 million in 1995 to a low of $133.7 million in 2008. Discrepancies composed more than one-third of the domestic market in 1995, but only 10 percent in 2009. Hong Kong, Singapore, and China together account for more than 80 percent of the cumulative discrepancies over the period and 74 percent of the discrepancy in 2009. The presence of large discrepancies supports the need to implement an effective tax marking and tobacco track and trace system to reduce illicit trade and support tax collection. The absence of a relation between tax changes and smuggling suggests that potential increases in the excise tax should not be discouraged by illicit trade. Finally, the identification of specific trade partners as primary sources for illicit trade may facilitate targeted efforts in cooperation with these governments to reduce illicit trade.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The television and film industries are used to working on large projects. These projects use media and documents of various types, ranging from actual film and videotape to items such as PERT charts for project planning. Some items, such as scripts, evolve over a period and go through many versions. It is often necessary to attach information to these “objects” in order to manage, track, and retrieve them. On large productions there may be hundreds of personnel who need access to this material and who in their turn generate new items which form some part of the final production. The requirements for this industry in terms of an information system may be generalized and a distributed software architecture built, primarily using the internet, to serve the needs of these projects. This architecture must enable potentially very large collections of objects to be managed in a secure environment with distributed responsibilities held by many working on the production. Copyright © 2005 by the Society of Motion Picture and Television Engineers, Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing complexity of new manufacturing processes and the continuously growing range of fabrication options mean that critical decisions about the insertion of new technologies must be made as early as possible in the design process. Mitigating the technology risks under limited knowledge is a key factor and major requirement to secure a successful development of the new technologies. In order to address this challenge, a risk mitigation methodology that incorporates both qualitative and quantitative analysis is required. This paper outlines the methodology being developed under a major UK grand challenge project - 3D-Mintegration. The main focus is on identifying the risks through identification of the product key characteristics using a product breakdown approach. The assessment of the identified risks uses quantification and prioritisation techniques to evaluate and rank the risks. Traditional statistical process control based on process capability and six sigma concepts are applied to measure the process capability as a result of the risks that have been identified. This paper also details a numerical approach that can be used to undertake risk analysis. This methodology is based on computational framework where modelling and statistical techniques are integrated. Also, an example of modeling and simulation technique is given using focused ion beam which is among the investigated in the project manufacturing processes.