874 resultados para National security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The authors draw on some powerful practitioner research they have been associated with recently to nvision ways in which a national curriculum might redress the inequities experienced by Australia's most disadvantaged young people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background and purpose: The appropriate fixation method for hemiarthroplasty of the hip as it relates to implant survivorship and patient mortality is a matter of ongoing debate. We examined the influence of fixation method on revision rate and mortality.----- ----- Methods: We analyzed approximately 25,000 hemiarthroplasty cases from the AOA National Joint Replacement Registry. Deaths at 1 day, 1 week, 1 month, and 1 year were compared for all patients and among subgroups based on implant type.----- ----- Results: Patients treated with cemented monoblock hemiarthroplasty had a 1.7-times higher day-1 mortality compared to uncemented monoblock components (p < 0.001). This finding was reversed by 1 week, 1 month, and 1 year after surgery (p < 0.001). Modular hemiarthroplasties did not reveal a difference in mortality between fixation methods at any time point.----- ----- Interpretation: This study shows lower (or similar) overall mortality with cemented hemiarthroplasty of the hip.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The provision of shelter is a basic need and in Australia there has been a history of home ownership. However recent economic growth and rising construction costs, particularly over the past decade, has placed home ownership out of reach for some. In response to increased affordability pressures, the Australian Federal Government established the National Rental Affordability Scheme (NRAS) in 2008. The aim of establishing the NRAS initiative is to stimulate the supply of new affordable rental dwellings, targeting 50,000 new properties by June 2012, through the provision of a National Rental Incentive for each “approved” dwelling. To be approved the dwelling must be newly constructed and subsequently rented to eligible low and moderate income households at rentals no greater than 80 percent of market rates. There is a further requirement that the accommodation be provided as part of the scheme for no less than 10 years. The requirement to provide new residential accommodation at below market rentals for no less than 10 years has an impact on value and as such the valuation methodologies employed. To give guidance to valuers this paper investigates the scheme, the impact on value and expectations for the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tony Fitzgerald’s visionary leap was to see beyond localised, individual wrongdoing. He suggested remedies that were systemic, institutionalised, and directed at underlying structural problems that led to corruption. His report said ‘the problems with which this Inquiry is concerned are not merely associated with individuals, but are institutionalized and related to attitudes which have become entrenched’ (Fitzgerald Report 1989, 13). His response was to suggest an enmeshed system of measures to not only respond reactively to future corruption, but also to prevent its recurrence through improved integrity systems. In the two decades since that report the primary focus of corruption studies and anti-corruption activism has remained on corruption at the local level or within sovereign states. International activism was largely directed at co-ordinating national campaigns and to use international instruments to make these campaigns more effective domestically. This reflects the broader fact that, since the rise of the nation state, states have comprised the majority of the largest institutional actors and have been the most significant institution in the lives of most individuals. This made states the ‘main game in town’ for the ‘governance disciplines’ of ethics, law, political science and economics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extraterritorial processing schemes are designed to prevent and deter access to statutory and judicial safeguards in the country responsible for the interception and transfer of asylum seekers to a third country. In line with this objective, they incorporate interdiction, transfer and processing practices and standards that are deliberately isolated from the national legal and institutional protections within either the intercepting state or the third country where processing occurs. Australia's recent disbandment of its extraterritorial processing centres in third countries highlights the fact that extraterritorial processing schemes have proven unworkable as a matter of international law, as they negate the national safeguards fundamental to the satisfaction of a state's protection obligations.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: We wished to explore the ways in which palliative care is included in undergraduate health services curricula in Australia and the barriers to, and opportunities for, such inclusion. Methods: A scoping study of current Australian undergraduate health care curricula, using an email survey of deans (or equivalent) of health faculties was designed utilising all Australian undergraduate courses that prepare medicine, nursing and allied health professionals for entry to practice. Participants were deans or faculty heads from health and related faculties which offered courses relevant to the project, identified from the Australian Government Department of Education, Science and Training website. Sixty-two deans (or equivalent) from 41 Australian universities were surveyed. A total of 42 completed surveys were returned (68% of deans). Main outcome measures were total hours, content, teaching and learning strategies and resources for palliative care education in undergraduate curricula; perceived gaps, barriers, and opportunities to support the inclusion of palliative care education in undergraduate curricula. Results: Forty-five percent of respondents reported the content of current curricula reflected the palliative approach to a large degree. More than half of the respondents reported that their course had palliative care components integrated to a minor degree and a further third to a moderate degree. The number of hours dedicated to palliative care and teaching and learning strategies varied across all respondents, although there was a high degree of commonality in content areas taught. Conclusion: Current Australian undergraduate courses vary widely in the nature and extent to which they provide education in palliative care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article compares YouTube and the National Film and Sound Archive (NFSA) as resources for television historians interested in viewing old Australian television programs. The author searched for seventeen important television programs, identified in a previous research project, to compare what was available in the two archives and how easy it was to find. The analysis focused on differences in curatorial practices of accessioning and cataloguing. NFSA is stronger in current affairs and older programs, while YouTube is stronger in game shows and lifestyle programs. YouTube is stronger than the NFSA on “human interest” material—births, marriages, and deaths. YouTube accessioning more strongly accords with popular histories of Australian television. Both NFSA and YouTube offer complete episodes of programs, while YouTube also offers many short clips of “moments.” YouTube has more surprising pieces of rare ephemera. YouTube cataloguing is more reliable than that of the NFSA, with fewer broken links. The YouTube metadata can be searched more intuitively. The NFSA generally provides more useful reference information about production and broadcast dates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly, national and international governments have a strong mandate to develop national e-health systems to enable delivery of much-needed healthcare services. Research is, therefore, needed into appropriate security and reliance structures for the development of health information systems which must be compliant with governmental and alike obligations. The protection of e-health information security is critical to the successful implementation of any e-health initiative. To address this, this paper proposes a security architecture for index-based e-health environments, according to the broad outline of Australia’s National E-health Strategy and National E-health Transition Authority (NEHTA)’s Connectivity Architecture. This proposal, however, could be equally applied to any distributed, index-based health information system involving referencing to disparate health information systems. The practicality of the proposed security architecture is supported through an experimental demonstration. This successful prototype completion demonstrates the comprehensibility of the proposed architecture, and the clarity and feasibility of system specifications, in enabling ready development of such a system. This test vehicle has also indicated a number of parameters that need to be considered in any national indexed-based e-health system design with reasonable levels of system security. This paper has identified the need for evaluation of the levels of education, training, and expertise required to create such a system.