922 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper metrics for assessing the performance of directional modulation (DM) physical-layer secure wireless systems are discussed. In the paper DM systems are shown to be categorized as static or dynamic. The behavior of each type of system is discussed for QPSK modulation. Besides EVM-like and BER metrics, secrecy rate as used in information theory community is also derived for the purpose of this QPSK DM system evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial and cultural aspects of corporate giving by UK and non-UK companies in response to the December 2004 South Asia Tsunami disaster are explored in this article. Literatures on corporate giving rationales, concepts of disaster and donor activity in disasters provide an underpinning. The article seeks to make connections between this high profile if short-lived business giving and the funding of the arts that is sought from business; and to draw tentative lessons for arts funding when seeking business support. The giving accounts in the wake of the Tsunami from a non-probability sample of 56 UK companies and 16 non-UK companies were examined. Reported online to the UK charity Business in the Community, these accounts were accessed in February 2005 and scrutinized thematically. Concurrently, company financial profiles to accompany giving figures were constructed. Although linkages between donation levels and financial performance were lacking, emerging themes included the role of employees, influencing company giving and creating a climate of expectation of firms' contributions. These developments may have important implications for business funding for the arts, where leading philanthropists are prominent as individuals in the giving landscapes; but employees' collective involvement is not marked. Alternatively, cultivation of employees as would-be donors, indirectly via their firms, may be a more secure, if lower level route to funding for some arts organizations than dependence on high profile business leaders. The article considers alternative scenarios for company giving in disaster contexts, including as a sustained and lasting giving theme or as company support as a ‘one-off’ event, rock-star style. The likely development of employee power as a key element in company giving is explored; and its wider meanings for funding in arts settings, (where the giver as rock star heroine/hero is also prominent) are considered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The EU is considered to be one of the main proponents of what has been called the deep trade agenda—that is, the push for further trade liberalization with an emphasis on the removal of domestic non-tariff regulatory measures affecting trade, as opposed to the traditional focus on the removal of trade barriers at borders. As negotiations on the Doha Development Round have stalled, the EU has attempted to achieve these aims by entering into comprehensive free trade agreements (FTAs) that are not only limited exclusively to tariffs but also extend to non-tariff barriers, including services, intellectual property rights (IPRs), competition, and investment. These FTAs place great emphasis on regulatory convergence as a means to secure greater market openings. The paper examines the EU's current external trade policy in the area of IP, particularly its attempts to promote its own regulatory model for the protection of IP rights through trade agreements. By looking at the IP enforcement provisions of such agreements, the article also examines how the divisive issues that are currently hindering the progress of negotiations at WTO level, including the demands from developing countries to maintain a degree of autonomy in the area of IP regulation as well as the need to balance IP protection with human rights protection, are being dealt with in recent EU FTAs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper examines the role of shared spaces in divided cities in promoting future sustainable communities and spaces described as inclusive to all. It addresses the current challenges that prevent such inclusiveness and suggests future trends of its development to be of benefit to the wider city community. It explains how spaces in divided cities are carved up into perceived ownerships and territorialized areas, which increases tension on the shared space between territories; the control of which can often lead to inter-community disputes. The paper reports that common shared space in-between conflicting communities takes on increased importance since the nature of the conflict places emphasis on communities’ confidence, politically and socially, while also highlighting the necessity for confidence in inclusion and feeling secure in the public domain. In order to achieve sustainable environments, strategies to promote shared spaces require further focus on the significance of everyday dynamics as essential aspects for future integration and conflict resolution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fully homomorphic encryption (FHE) scheme is envisioned as a key cryptographic tool in building a secure and reliable cloud computing environment, as it allows arbitrary evaluation of a ciphertext without revealing the plaintext. However, existing FHE implementations remain impractical due to very high time and resource costs. To the authors’ knowledge, this paper presents the first hardware implementation of a full encryption primitive for FHE over the integers using FPGA technology. A large-integer multiplier architecture utilising Integer-FFT multiplication is proposed, and a large-integer Barrett modular reduction module is designed incorporating the proposed multiplier. The encryption primitive used in the integer-based FHE scheme is designed employing the proposed multiplier and modular reduction modules. The designs are verified using the Xilinx Virtex-7 FPGA platform. Experimental results show that a speed improvement factor of up to 44 is achievable for the hardware implementation of the FHE encryption scheme when compared to its corresponding software implementation. Moreover, performance analysis shows further speed improvements of the integer-based FHE encryption primitives may still be possible, for example through further optimisations or by targeting an ASIC platform.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this research was to explore consumer perceptions of personalised nutrition and to compare these across three different levels of "medicalization": lifestyle assessment (no blood sampling); phenotypic assessment (blood sampling); genomic assessment (blood and buccal sampling). The protocol was developed from two pilot focus groups conducted in the UK. Two focus groups (one comprising only "older" individuals between 30 and 60 years old, the other of adults 18-65 yrs of age) were run in the UK, Spain, the Netherlands, Poland, Portugal, Ireland, Greece and Germany (N = 16). The analysis (guided using grounded theory) suggested that personalised nutrition was perceived in terms of benefit to health and fitness and that convenience was an important driver of uptake. Negative attitudes were associated with internet delivery but not with personalised nutrition per se. Barriers to uptake were linked to broader technological issues associated with data protection, trust in regulator and service providers. Services that required a fee were expected to be of better quality and more secure. An efficacious, transparent and trustworthy regulatory framework for personalised nutrition is required to alleviate consumer concern. In addition, developing trust in service providers is important if such services to be successful. (C) 2013 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tephrochronology, a key tool in the correlation of Quaternary sequences, relies on the extraction of tephra shards from sediments for visual identification and high-precision geochemical comparison. A prerequisite for the reliable correlation of tephra layers is that the geochemical composition of glass shards remains unaltered by natural processes (e.g. chemical exchange in the sedimentary environment) and/or by laboratory analytical procedures. However, natural glasses, particularly when in the form of small shards with a high surface to volume ratio, are prone to chemical alteration in both acidic and basic environments. Current techniques for the extraction of distal tephra from sediments involve the ‘cleaning’ of samples in precisely such environments and at elevated temperatures. The acid phase of the ‘cleaning’ process risks alteration of the geochemical signature of the shards, while the basic phase leads to considerable sample loss through dissolution of the silica network. Here, we illustrate the degree of alteration and loss to which distal tephras may be prone, and introduce a less destructive procedure for their extraction. This method is based on stepped heavy liquid flotation and which results in samples of sufficient quality for analysis while preserving their geochemical integrity. In trials, this method out-performed chemical extraction procedures in terms of the number of shards recovered and has resulted in the detection of new tephra layers with low shard concentrations. The implications of this study are highly significant because (i) the current database of distal tephra records and their corresponding geochemical signatures may require refinement and (ii) the record of distal tephras may be incomplete due to sample loss induced by corrosive laboratory procedures. It is therefore vital that less corrosive laboratory procedures are developed to make the detection and classification of distal glass tephra more secure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Asthma is now one of the most common long-term conditions in the UK. It is therefore important to develop a comprehensive appreciation of the healthcare and societal costs in order to inform decisions on care provision and planning. We plan to build on our earlier estimates of national prevalence and costs from asthma by filling the data gaps previously identified in relation to healthcare and broadening the field of enquiry to include societal costs. This work will provide the first UK-wide estimates of the costs of asthma. In the context of asthma for the UK and its member countries (ie, England, Northern Ireland, Scotland and Wales), we seek to: (1) produce a detailed overview of estimates of incidence, prevalence and healthcare utilisation; (2) estimate health and societal costs; (3) identify any remaining information gaps and explore the feasibility of filling these and (4) provide insights into future research that has the potential to inform changes in policy leading to the provision of more cost-effective care.

Methods and analysis Secondary analyses of data from national health surveys, primary care, prescribing, emergency care, hospital, mortality and administrative data sources will be undertaken to estimate prevalence, healthcare utilisation and outcomes from asthma. Data linkages and economic modelling will be undertaken in an attempt to populate data gaps and estimate costs. Separate prevalence and cost estimates will be calculated for each of the UK-member countries and these will then be aggregated to generate UK-wide estimates.

Ethics and dissemination Approvals have been obtained from the NHS Scotland Information Services Division's Privacy Advisory Committee, the Secure Anonymised Information Linkage Collaboration Review System, the NHS South-East Scotland Research Ethics Service and The University of Edinburgh's Centre for Population Health Sciences Research Ethics Committee. We will produce a report for Asthma-UK, submit papers to peer-reviewed journals and construct an interactive map.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter presents an analysis of the unprecedented use of electronic voting by expatriates during the French 2012 legislative elections, when they elected their own representatives (referred to here as ‘deputies’), to the National Assembly in Paris for the first time, in 11 newly created overseas constituencies.
The study is presented within the broader perspective of electronic voting in France more generally, and in the historical context of extra-territorial voting by French expatriates. The authors discuss the main issues and controversies that arose during the 2012 elections, and in a final section analyse the results. The authors conclude by drawing attention to recent developments in electronic voting in France since the 2012 elections, which suggest that although there was much criticism expressed by experts of electronic voting as to the security and transparency of the system used, the official discourse that acclaimed the experience as a success, appears to have convinced its target audience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Unlike the mathematical techniques adopted in classical cryptographic technology at higher protocol layers, it is shown that characteristics intrinsic to the physical layer can be exploited to secure useful information. It is shown that a retrodirective array can be made to operate more securely by incorporating directional modulation (DM) concepts. The presented new approach allows DM to operate in a multipath environment. Previously, DM systems could only operate in free space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Leniency (amnesty) plus is one of the tools used in the fight against anticompetitive agreements. It allows a cartelist who did not manage to secure complete immunity under general leniency, to secure an additional reduction of sanctions in exchange for cooperation with the authorities with respect to operation of another prohibited agreement on an unrelated market. The instrument was developed in the United States and, in recent years, it was introduced in a number of jurisdictions. This article contextualises the operation of and rationale behind leniency plus, forewarning about its potential procollusive effects and the possibility of its strategic (mis)use by cartelists. It discusses theoretical, moral, and systemic (deterrence-related) problems surrounding this tool. It also provides a comparison of leniency plus in eleven jurisdictions, identifying common design flaws. This piece argues that leniency plus tends to be a problematic and poorly transplanted US legal innovation. Policy-makers considering its introduction should analyse it in light of institutional limits and local realities. Some of the regimes which already introduced it would be better off abandoning it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.