964 resultados para Secure Authentication for Broadcast (DNP3-SAB)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending web services from DoS attacks using client puzzles, a cryptographic countermeasure which provides a form of gradual authentication by requiring the client to solve some computationally difficult problems before access is granted. In particular, we describe a mechanism for integrating a hash-based puzzle into existing web services frameworks and analyze the effectiveness of the countermeasure using a variety of scenarios on a network testbed. Client puzzles are an effective defence against flooding attacks. They can also mitigate certain types of semantic-based attacks, although they may not be the optimal solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter examines how a change in school leadership can successfully address competencies in complex situations and thus create a positive learning environment in which Indigenous students can excel in their learning rather than accept a culture that inhibits school improvement. Mathematics has long been an area that has failed to assist Indigenous students in improving their learning outcomes, as it is a Eurocentric subject (Rothbaum, Weisz, Pott, Miyake & Morelli, 2000, De Plevitz, 2007) and does not contextualize pedagogy with Indigenous culture and perspectives (Matthews, Cooper & Baturo, 2007). The chapter explores the work of a team of Indigenous and non-Indigenous academics from the YuMi Deadly Centre who are turning the tide on improving Indigenous mathematical outcomes in schools and in communities with high numbers of Aboriginal and Torres Strait Islander students.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Starting from a local problem with finding an archival clip on YouTube, this paper expands to consider the nature of archives in general. It considers the technological, communicative and philosophical characteristics of archives over three historical periods: 1) Modern ‘essence archives’ – museums and galleries organised around the concept of objectivity and realism; 2) Postmodern mediation archives – broadcast TV systems, which I argue were also ‘essence archives,’ albeit a transitional form; and 3) Network or ‘probability archives’ – YouTube and the internet, which are organised around the concept of probability. The paper goes on to argue the case for introducing quantum uncertainty and other aspects of probability theory into the humanities, in order to understand the way knowledge is collected, conserved, curated and communicated in the era of the internet. It is illustrated throughout by reference to the original technological 'affordance' – the Olduvai stone chopping tool.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an effective method for signal-authentication and spoofing detection for civilian GNSS receivers using the GPS L1 C/A and the Galileo E1-B Safety of Life service. The paper discusses various spoofing attack profiles and how the proposed method is able to detect these attacks. This method is relatively low-cost and can be suitable for numerous mass-market applications. This paper is the subject of a pending patent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decision-making situations, increasingly powerful attacks become possible against machine learning systems. In this paper, we present three broad research directions towards the end of developing truly secure learning. First, we suggest that finding bounds on adversarial influence is important to understand the limits of what an attacker can and cannot do to a learning system. Second, we investigate the value of adversarial capabilities-the success of an attack depends largely on what types of information and influence the attacker has. Finally, we propose directions in technologies for secure learning and suggest lines of investigation into secure techniques for learning in adversarial environments. We intend this paper to foster discussion about the security of machine learning, and we believe that the research directions we propose represent the most important directions to pursue in the quest for secure learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australia has witnessed a continual increase in maternal employment over the past two decades, which has placed focus on child care- its effects on the child and on early childhood education and care policy and provision. The engagement of women in the paid workforce contributes to national economic development, and is recognised in government policy incentives such as cash subsidies and tax relief for child care fees. These incentives are targeted towards mothers, to encourage them to engage in paid work. Making a contribution to the family’s economy and to a mother’s economic self sufficiency are two key drivers for women’s engagement in satisfying paid work. Many women also seek to maintain a personal investment in the development of their career, simultaneously ensuring that the child is experiencing suitable care. Policies that support women’s choices for satisfying workforce engagement and care arrangements are prudent for ensuring productivity of the economy as well as for enhancing the wellbeing of parents and children (OECD, 2007). Policies that provide family friendly employment arrangements, paid parental leave, and child care support, directly affect maternal employment decisions. Availability of family friendly employment policies is viewed as one way to not only promote gender equity in employment opportunities but also support the wellbeing of children and families (OECD, 2007). Yet there are not comprehensive and coherent policies on work and family in Australia. Australia is due to implement its first paid parental leave scheme in January, 2011. At the time of the data collection of this research, June 2007 to December 2008, Australia had no statutory provision for paid parental leave. To date, most research has focused on the consequences of paid work and care decisions made by women. Far less is known about the processes of decision-making and reasons underlying women’s choices. Investigation of what is most salient for women as they make decisions regarding engagement in paid work, and care for their child is important in order to inform policy and practices related to parental leave, family friendly employment and care for the child. This prospective longitudinal research was of 124 Australian expectant first-time mothers who completed questionnaires in their third trimester of pregnancy, and again at six and twelve months postpartum. First-time expectant mothers' decisions regarding engaging in paid work and selecting care for their child represent those of a group who are invested in motherhood and have usually had direct experience of engaging in paid work. They therefore provide an important insight into society’s idealised views about motherhood and the emotional and social uncertainty of making personal decisions where the consequences of such decisions are unknown. These decisions reflect public beliefs about the role of women in contributing to the country’s productivity and decisions about providing for the economic and emotional care needs of their family. As so little is known about the reasoning and processes of decision-making of women’s choices regarding paid work and care of the child this research was designed to capture expectant first-time mother’s preferred options for engaging in paid work and the care of their child, and investigate their actual decisions made at six and 12 months postpartum. To capture preferred options, decisions and outcomes of decisions regarding paid work and care of the child a prospective longitudinal research design was utilised. This design had three important components that addressed key limitations in the extant literature. First the research commenced in pregnancy in order to investigate preferences and beliefs about paid work and care and to examine baseline data that may influence decisions made as the women returned to paid work. Second the research involved longitudinal tracking from the antenatal time point to six and 12 months postpartum in order to identify the influences on decisions made. Third the research measured outcomes of the decisions made at each time point. This research examined the intentions, preferences, beliefs, influences, and outcomes of the decisions about engagement in paid work and choice of care. The analyses examined factors predicting return to paid work, the timing of return and extent of engagement in paid work; the care for the child; satisfaction with paid work; satisfaction with care for the child, motherhood and fulfilment; and maternal wellbeing at six and 12 months postpartum. The factors of interest were both rational/economic (availability and extent of paid and unpaid maternity leave; flexible work patterns) and emotional/affective (career satisfaction, investment in motherhood, and concern with quality of care for the child). Results indicated a group preference, and realisation for, return to paid work within the first year after the birth of a child but with reduction in hours to part-time. Most women saw paid work not only as a source of income but also as source of personal satisfaction. There were four key themes arising from this research. First, the women strived to feel emotionally secure when deciding about engaging in paid work and care of the child. To achieve emotional security women made their decisions for paid work and care of the child differently. A woman’s decision for maternal employment is a function of her personal beliefs, preferences and context regarding paid work and care of the child. She adjusts her established work identity with her new identity as a mother. The second key theme from this research is that the women made their decisions for maternal employment in response to their personal context and there were different levels of opportunities between the women’s choices. There is inequity of entitlement regarding work conditions associated with a woman’s education level. This has implications for the woman’s engagement in paid work, and her child’s health and wellbeing. The third key theme is that the quality of the child’s care mattered to the women in the research. They preferred care provided by parents and/or relatives more than any other types of care. The fourth key theme identified that satisfaction and wellbeing outcomes experienced as a result of maternal employment decisions were a complex interaction between multiple factors that change across time with the ongoing development of the mother’s identity, and the development of the child. The implications for policy within Australia are that the employment of mothers in the workforce necessitates that non-parental care becomes a public concern, where there is universal access to good quality affordable care for every child, not just for those who can afford it. This is equitable and represents real choice while supporting the rights of the child (Thorpe, Cloney & Tayler, 2010), protecting and promoting the public interest (Cleveland & Krashinsky, 2010). Children’s health and wellbeing will be supported (Moore & Oberklaid, 2010) while children are in non-parental care, and they will be exposed to environments and experiences that support their learning and development. The significant design of the research enabled the trajectories of first-time expectant women to be tracked from the antenatal point to 12 months postpartum. But there were limitations: the small sample size, the over-representation of the sample being highly educated and the nature of a longitudinal research that is set within the economic, social and political context at that time. These limitations are discussed in relation to suggestions for future research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the Australian Journal of Music Therapy celebrates its 20th year of publication, it is evident that the profession of music therapy in Australia, has made substantial progress over these last 20 years. Jobs are regularly advertised on the website, there is a greater public awareness of what music therapy is, there are government recognised salary awards applicable in several states of the country, working conditions have generally improved, and many Australian music therapists are recognised on the international stage as leaders in their field of expertise. You can even go to a party and tell someone you are a music therapist and there is a good chance they will say 'oh yeah, I know someone who does that at the hospital / school / community centre / nursing home' instead of saying 'oh, so like, a what?'. Despite the impressive leaps and bounds that have been made, and the success of many programs in Australia to date, there is still a great deal of room for improvement. What are the critical issues ahead for the development of music therapy in Australia? In particular, how do music therapists develop going forward and secure funding for clinical initiatives? In reflecting on this question, this article identifies two key areas, amongst the many, that can be addressed by music therapists over the next 20 years: funding and employment conditions. Examples from the national early intervention music therapy program 'Sing and Grow' are used to illustrate the potential impact of addressing these two issues on the positive development of the profession into the future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines some of the central global ethical and governance challenges of climate change and carbon emis-sions reduction in relation to globalization, the “global financial crisis” (GFC), and unsustainable conceptions of the “good life”, and argues in favour of the development of a global carbon “integrity system”. It is argued that a funda-mental driver of our climate problems is the incipient spread of an unsustainable Western version of the “good life”, where resource-intensive, high-carbon western lifestyles, although frequently criticized as unsustainable and deeply unsatisfying, appear to have established an unearned ethical legitimacy. While the ultimate solution to climate change is the development of low carbon lifestyles, the paper argues that it is also important that economic incentives support and stimulate that search: the sustainable versions of the good life provide an ethical pull, whilst the incentives provide an economic push. Yet, if we are going to secure sustainable low carbon lifestyles, it is argued, we need more than the ethical pull and the economic push. Each needs to be institutionalized—built into the governance of global, regional, national, sub-regional, corporate and professional institutions. Where currently weakness in each exacerbates the weaknesses in others, it is argued that governance reform is required in all areas supporting sustainable, low carbon versions of the good life.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the results from a study of information behaviors in the context of people's everyday lives as part of a larger study of information behaviors (IB). 34 participants from across 6 countries maintained a daily information journal or diary – mainly through a secure web log – for two weeks, to an aggregate of 468 participant days over five months. The text-rich diary data was analyzed using Grounded Theory analysis. The findings indicate that information avoidance is a common phenomenon in everyday life and consisted of both passive avoidance and active avoidance. This has implications for several aspects of peoples' lives including health, finance, and personal relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Continuous user authentication with keystroke dynamics uses characters sequences as features. Since users can type characters in any order, it is imperative to find character sequences (n-graphs) that are representative of user typing behavior. The contemporary feature selection approaches do not guarantee selecting frequently-typed features which may cause less accurate statistical user-representation. Furthermore, the selected features do not inherently reflect user typing behavior. We propose four statistical based feature selection techniques that mitigate limitations of existing approaches. The first technique selects the most frequently occurring features. The other three consider different user typing behaviors by selecting: n-graphs that are typed quickly; n-graphs that are typed with consistent time; and n-graphs that have large time variance among users. We use Gunetti’s keystroke dataset and k-means clustering algorithm for our experiments. The results show that among the proposed techniques, the most-frequent feature selection technique can effectively find user representative features. We further substantiate our results by comparing the most-frequent feature selection technique with three existing approaches (popular Italian words, common n-graphs, and least frequent ngraphs). We find that it performs better than the existing approaches after selecting a certain number of most-frequent n-graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between radiologic union and clinical outcome in thoracoscopic scoliosis surgery is not clear, as apparent non-union of a spinal fusion does not always correspond to a poor clinical result. The aim of this study was to evaluate CT fusion rates 24 months after thoracoscopic anterior scoliosis surgery, and to explore the relationship between fusion scores and; (i) rod diameter, (ii) graft type, (iii) fusion level, (iv) occurrence of post-operative implant failure, and (v) lateral position of the fusion mass in the intervertebral disc space. We propose that moderate fusion scores on the Sucato scale secure successful clinical outcomes in thoracoscopic scoliosis surgery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between radiologic union and clinical outcomes in thoracoscopic scoliosis surgery is not clear, as apparent non-union of a spinal fusion does not always correspond to a poor clinical result. The aim of this study was to evaluate for the first time the interbody fusion rates using low dose CT scans at minimum 24 months after thoracoscopic scoliosis surgery, and to explore the relationship between fusion scores and; (i) rod diameter, (ii) graft type, (iii) fusion level, (iv) implant failure, and (v) lateral position in the disc space. The study found that moderate fusion scores on the Sucato scale secure successful clinical outcomes in thoracoscopic scoliosis surgery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is little research on HRM practices in knowledge-intensive firms (KIFs), especially in comparison to that conducted in traditional production environments. Whether such HRM practices are appropriate for KIFs, particularly ones that differentiate themselves on their ability to innovate, is the basis of this research. The study investigates the HRM practices being used by four innovative firms: two KIFs and two traditional production companies. The findings suggest that there are some similarities between the HRM practices of the case firms, but there are also important differences. Specifically, the KIFs emphasise use of selection criteria and processes that secure a workforce with a desire for challenging work and the ability to work collaboratively. The KIFs are also more likely to provide a breadth of training and development opportunities for teams and individuals, to make extensive use of performance management systems, and to utilise a range of strategies to encourage and reward innovation.