845 resultados para Secure Authentication for Broadcast (DNP3-SAB)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last five years we have observed the fallout from the global financial crisis (GFC). International cooperation and jointly adopted policies have dominated many of the solutions to the problems which have arisen. Initially, many nations in response to the GFC, implemented a two pronged short term solution by undertaking fiscal intervention and delivering rescue packages aimed at first, bailing out financial institutions and second, preventing or minimising the impact of a recession. Both programs involved large amounts of domestic spending. It was difficult in early 2007 to foresee the reduction that nations were about the face in domestic revenue collected. Five years on, not only have the first line effects of the GFC reduced the revenue raised by governments around the world, but the consequential costs associated with the rescue packages have also depleted domestic revenue bases. The response by stakeholders has been to attempt to secure domestic revenue bases through fiscally sustainable measures. Domestic sovereignty allows the levying of taxes as a nation chooses. However, rather than raise domestic taxes, revenue may also be increased by stemming the flow of income and capital to low and no-tax jurisdictions. The intervening five-year period since the GFC allows a unique insight into the response by nations and international organisations to tax evasion, tax avoidance and aggressive tax competition through the cross border flows of capital and the resulting affect that the GFC has had on international tax cooperation. By investigating the change in the international tax landscape over the last five years, which reveals the work done by stakeholders in developing fiscally responsible responses to the problems that have arisen, it may be possible to predict the trajectory of the international tax landscape over the next five years.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food insecurity is the inadequate access to, or availability of, sufficient amounts of nutritious, culturally-appropriate and safe foods, or the inability to acquire such foods by socially acceptable means. Food insecurity has been shown to be associated with poor dietary intakes and poor health status. Recently, evidence has emerged suggesting increased rates of food insecurity among those with substance abuse problems, including those who smoke. This cross-sectional study investigates the potential moderating effect of smoking on the association between food insecurity and fruit and vegetable intakes among the Australian population, using regression analyses. Participants were adults 18 years and older participating in the 2004/05 National Health Survey (n = 19,500). Those from food insecure households were up to two-times more likely to report inadequate fruit and vegetable intakes compared to those who were food secure. Those who smoked were nearly six times more likely to report being food insecure, and up to three-times more likely to report inadequate fruit and vegetable intakes, compared to their non-smoking counterparts. Further analyses revealed a marked decline in the strength of the association between food insecurity and fruit consumption with the addition of smoking status into a regression model. These findings have important implications for the development of policy and interventions to address food insecurity, suggesting that those from food insecure households are less likely to comply with national dietary recommendations, and that this may in part be moderated by smoking status.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Food insecurity is the limited availability of, or access to, sufficient amounts of nutritious, culturally-appropriate and safe foods, or the inability to access such foods by socially-acceptable means. Evidence from the United States and Canada suggests that food insecurity may be associated with poor dietary intakes, obesity, and chronic disease including depression and diabetes, thus constituting a significant public health issue. Currently, no existing studies have investigated the dietary and health factors associated with food insecurity among the general Australian population. The current study investigated the potential associations between food insecurity, diet and health among Australian adults (18 years and over) participating in the cross-sectional National Health Survey (n = 19,500). Data were analysed by logistic regression adjusting for sociodemographic covariates. Those from food insecure households were 50% less likely to consume the recommended number of servings of fruit, 60% more likely to report poor health and experienced a 6-fold increase in the risk of severe depressive disorders, compared to their food secure counterparts. Furthermore, food insecurity was associated with a 50% increase in the risk of being diagnosed with ‘high sugar levels’. Finally, women from food insecure households were 30% more likely to be obese compared to their food secure counterparts. These findings suggest that food insecurity may play an important role in preventing adherence with national dietary recommendations, and may increase the risk of obesity and chronic illness. This has important implications for both clinical practice, and the development of interventions and policy to address food insecurity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper extends the understanding of working-time changes and work-life balance (WLB) through analyzing a case study where a reduction in working hours designed to assist the workforce in balancing work and nonwork life was implemented. An alliance project in the Australian construction industry was established initially with a 5-day working week, a departure from the industry-standard 6-day week. However, a range of factors complicated the success of this initiative, and the industry-standard 6-day working week was reinstated for the project. The authors argue that this case is valuable in determining the complex mix of influences that work against a wholesale or straightforward adoption of working-time adjustments and work-life balance practices. It is concluded that although the prevailing workplace culture is considered an important factor in the determination of working time, structural and workplace principles and practices may also be critical in working to secure the successful introduction of working-time reduction and work-life balance initiatives in the construction industry in the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article assesses undergraduate teaching students’ assertion that there are no right and wrong answers in teaching philosophy. When asked questions about their experiences of philosophy in the classroom for primary children, their unanimous declaration that teaching philosophy has ‘no right and wrong answers’ is critically examined across the three sub-disciplinary areas to which they were generally referring, namely, pedagogy, ethics, and epistemology. From a pedagogical point of view, it is argued that some teaching approaches may indeed be more effective than others, and some pupils’ opinions less defensible, but pedagogically, in terms of managing the power relations in the classroom, it is counter-productive to continually insist on notions of truth and falsity at every point. From an ethical point of view, it is contended that anti-realist approaches to meta-ethics may represent a viable intellectual position, but from the point of view of normative ethics, notions of right and wrong still retain significant currency. From an epistemological point of view, it is argued using Karl Poppers’ work that while it may be difficult to determine what constitutes a right answer, determining a wrong one is far more straightforward. In conclusion, it is clear that prospective teachers engaging in philosophy in the classroom, and also future teachers in general, require a far more nuanced philosophical understanding of the notions of right and wrong and truth and falsity. In view of this situation, it we wish to promote the effective teaching of philosophical thinking to children, or produce educators who can understand the conceptual limits of the claims they make and their very real and often serious practical and social consequences, it is recommended that philosophy be reinstated to a fundamental, foundational place within the pre-service teaching curriculum.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Amongst the most prominent uses of Twitter at present is its role in the discussion of widely televised events: Twitter’s own statistics for 2011, for example, list major entertainment spectacles (the MTV Music Awards, the BET Awards) and sports matches (the UEFA Champions League final, the FIFA Women’s World Cup final) amongst the events generating the most tweets per second during the year (Twitter, 2011). User activities during such televised events constitute a specific, unique category of Twitter use, which differs clearly from the other major events which generate a high rate of tweets per second (such as crises and breaking news, from the Japanese earthquake and tsunami to the death of Steve Jobs), as preliminary research has shown. During such major media events, by contrast, Twitter is used most predominantly as a technology of fandom instead: it serves in the first place as a backchannel to television and other streaming audiovisual media, enabling users offer their own running commentary on the universally shared media text of the event broadcast as it unfolds live. Centrally, this communion of fans around the shared text is facilitated by the use of Twitter hashtags – unifying textual markers which are now often promoted to prospective audiences by the broadcasters well in advance of the live event itself. This paper examines the use of Twitter as a technology for the expression of shared fandom in the context of a major, internationally televised annual media event: the Eurovision Song Contest. It constitutes a highly publicised, highly choreographed media spectacle whose eventual outcomes are unknown ahead of time and attracts a diverse international audience. Our analysis draws on comprehensive datasets for the ‘official’ event hashtags, #eurovision, #esc, and #sbseurovision. Using innovative methods which combine qualitative and quantitative approaches to the analysis of Twitter datasets containing several hundreds of thousands, we examine overall patterns of participation to discover how audiences express their fandom throughout the event. Minute-by-minute tracking of Twitter activity during the live broadcasts enables us to identify the most resonant moments during each event; we also examine the networks of interaction between participants to detect thematically or geographically determined clusters of interaction, and to identify the most visible and influential participants in each network. Such analysis is able to provide a unique insight into the use of Twitter as a technology for fandom and for what in cultural studies research is called ‘audiencing’: the public performance of belonging to the distributed audience for a shared media event. Our work thus contributes to the examination of fandom practices led by Henry Jenkins (2006) and other scholars, and points to Twitter as an important new medium facilitating the connection and communion of such fans.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The deployment of new emerging technologies, such as cooperative systems, allows the traffic community to foresee relevant improvements in terms of traffic safety and efficiency. Vehicles are able to communicate on the local traffic state in real time, which could result in an automatic and therefore better reaction to the mechanism of traffic jam formation. An upstream single hop radio broadcast network can improve the perception of each cooperative driver within radio range and hence the traffic stability. The impact of a cooperative law on traffic congestion appearance is investigated, analytically and through simulation. Ngsim field data is used to calibrate the Optimal Velocity with Relative Velocity (OVRV) car following model and the MOBIL lane-changing model is implemented. Assuming that congestion can be triggered either by a perturbation in the instability domain or by a critical lane changing behavior, the calibrated car following behavior is used to assess the impact of a microscopic cooperative law on abnormal lane changing behavior. The cooperative law helps reduce and delay traffic congestion as it increases traffic flow stability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Implementation Guide for the Hospital Surveillance of SAB has been produced by the Healthcare Associated Infection (HAI) Technical Working Group of the Australian Commission on Safety and Quality in Health Care (ACSQHC), and endorsed by the HAI Advisory Group. The Technical Working Group is made up of representatives invited from surveillance units and the ACSQHC, who have had input into the preparation of this Guide. The Guide has been developed to ensure consistency in reporting of SAB across public and private hospitals to enable accurate national reporting and benchmarking. It is intended to be used by Australian hospitals and organisations to support the implementation of healthcare associated Staphylococcus aureus bacteraemia(SAB) surveillance using the endorsed case definition1 in the box below and further detail in the Data Set Specification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter presents a comparative survey of recent key management (key distribution, discovery, establishment and update) solutions for wireless sensor networks. We consider both distributed and hierarchical sensor network architectures where unicast, multicast and broadcast types of communication take place. Probabilistic, deterministic and hybrid key management solutions are presented, and we determine a set of metrics to quantify their security properties and resource usage such as processing, storage and communication overheads. We provide a taxonomy of solutions, and identify trade-offs in these schemes to conclude that there is no one-size-fits-all solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of public space by children and young people is a contentious issue in a number of developed and developing countries and a range of measures are frequently deployed to control the public space which usually deny the rights of children and young people to claim the space for their use. Child and youth curfews, oppressive camera surveillance and the unwarranted attentions of police and private security personnel as control measures in public space undermine attempts to secure greater participation by children and young people in constructing positive strategies to address concerns that impact on them and others in a local area. Evidence from research in Scotland undertaken by Article 12 (2000) suggests that young people felt strongly that they did not count in local community matters and decision making and the imposition on them of a curfew by the adult world of the local area created resentment both at the harshness of the measure and disappointment at an opportunity lost to be consulted and involved in dealing with perceived problems of the locality. This is an important cluster of linked issues as Brown (1998:116) argues that young people are ‘selectively constructed as “problem” and “other” with their concerns marginalised, their lifestyles problematised and their voices subdued’, and this flows into their use of public space as their claims to its use as an aspect of social citizenship are usually cast as inferior or rejected as they ‘stand outside the formal polity’ as ‘non persons’. This has major implications for the ways in which young people view their position in a community as many report a feeling of not being wanted, valued or tolerated. The ‘youth question’ according to Davis (1990) acts as a form of ‘screen’ on which observers and analysts project hopes and fears about the state of society, while in the view of Loader (1996:89) the ‘question of young people’ sits within a discourse comprising two elements, the one being youth, particularly young males, as the ‘harbinger of often unwelcome social change and threat’ and the other element ‘constructs young people as vulnerable’. This discourse of threat is further exemplified in the separation of children from teenagers as Valentine (1996) suggests, the treatment of younger children using public space is often dramatically different to that of older children and the most feared stage of all, 'youth'