922 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the core properties of Software Defined Networking (SDN) is the ability for third parties to develop network applications. This introduces increased potential for innovation in networking from performance-enhanced to energy-efficient designs. In SDN, the application connects with the network via the SDN controller. A specific concern relating to this communication channel is whether an application can be trusted or not. For example, what information about the network state is gathered by the application? Is this information necessary for the application to execute or is it gathered for malicious intent? In this paper we present an approach to secure the northbound interface by introducing a permissions system that ensures that controller operations are available to trusted applications only. Implementation of this permissions system with our Operation Checkpoint adds negligible overhead and illustrates successful defense against unauthorized control function access attempts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Renewed archaeological investigation of the West Mouth of Niah Cave, Borneo has demonstrated that even within lowland equatorial environments depositional conditions do exist where organic remains of late glacial and early post-glacial age can be preserved. Excavations by the Niah Cave Research Project (NCP) (2000-2003) towards the rear of the archaeological reserve produced several bone points and worked stingray spines, which exhibit evidence of hafting mastic and fibrous binding still adhering to their shafts. The position of both gives strong indication of how these cartilaginous points were hafted and gives insight into their potential function. These artefacts were recovered from secure and (14)C dated stratigraphic horizons. The results of this study have implications for our understanding the function of the Terminal Pleistocene and Early Holocene bone tools recovered from other regions of Island Southeast Asia. They demonstrate that by the end the Pleistocene rainforest foragers in Borneo were producing composite technologies that probably included fishing leisters and potentially the bow and arrow. (C) 2009 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research in Europe, Africa, and Southeast Asia suggests that we can no longer assume a direct and exclusive link between anatomically modern humans and behavioral modernity (the 'human revolution'), and assume that the presence of either one implies the presence of the other: discussions of the emergence of cultural complexity have to proceed with greater scrutiny of the evidence on a site-by-site basis to establish secure associations between the archaeology present there and the hominins who created it. This paper presents one such case study: Niah Cave in Sarawak on the island of Borneo, famous for the discovery in 1958 in the West Mouth of the Great Cave of a modern human skull, the 'Deep Skull,' controversially associated with radiocarbon dates of ca. 40,000 years before the present. A new chronostratigraphy has been developed through a re-investigation of the lithostratigraphy left by the earlier excavations, AMS-dating using three different comparative pre-treatments including ABOX of charcoal, and U-series using the Diffusion-Absorption model applied to fragments of bones from the Deep Skull itself. Stratigraphic reasons for earlier uncertainties about the antiquity of the skull are examined, and it is shown not to be an `intrusive' artifact. It was probably excavated from fluvial-pond-desiccation deposits that accumulated episodically in a shallow basin immediately behind the cave entrance lip, in a climate that ranged from times of comparative aridity with complete desiccation, to episodes of greater surface wetness, changes attributed to regional climatic fluctuations. Vegetation outside the cave varied significantly over time, including wet lowland forest, montane forest, savannah, and grassland. The new dates and the lithostratigraphy relate the Deep Skull to evidence of episodes of human activity that range in date from ca. 46,000 to ca. 34,000 years ago. Initial investigations of sediment scorching, pollen, palynomorphs, phytoliths, plant macrofossils, and starch grains recovered from existing exposures, and of vertebrates from the current and the earlier excavations, suggest that human foraging during these times was marked by habitat-tailored hunting technologies, the collection and processing of toxic plants for consumption, and, perhaps, the use of fire at some forest-edges. The Niah evidence demonstrates the sophisticated nature of the subsistence behavior developed by modern humans to exploit the tropical environments that they encountered in Southeast Asia, including rainforest. (c) 2006 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital signatures are an important primitive for building secure systems and are used in most real-world security protocols. However, almost all popular signature schemes are either based on the factoring assumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case of classical cryptanalytic advances or progress on the development of quantum computers, the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of signature schemes based on the hardness of certain lattice problems that are assumed to be intractable by quantum computers. Due to significant research advancements in recent years, lattice-based schemes have now become practical and appear to be a very viable alternative to number-theoretic cryptography. In this article, we focus on recent developments and the current state of the art in lattice-based digital signatures and provide a comprehensive survey discussing signature schemes with respect to practicality. Additionally, we discuss future research areas that are essential for the continued development of lattice-based cryptography.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This special issue provides the latest research and development on wireless mobile wearable communications. According to a report by Juniper Research, the market value of connected wearable devices is expected to reach $1.5 billion by 2014, and the shipment of wearable devices may reach 70 million by 2017. Good examples of wearable devices are the prominent Google Glass and Microsoft HoloLens. As wearable technology is rapidly penetrating our daily life, mobile wearable communication is becoming a new communication paradigm. Mobile wearable device communications create new challenges compared to ordinary sensor networks and short-range communication. In mobile wearable communications, devices communicate with each other in a peer-to-peer fashion or client-server fashion and also communicate with aggregation points (e.g., smartphones, tablets, and gateway nodes). Wearable devices are expected to integrate multiple radio technologies for various applications' needs with small power consumption and low transmission delays. These devices can hence collect, interpret, transmit, and exchange data among supporting components, other wearable devices, and the Internet. Such data are not limited to people's personal biomedical information but also include human-centric social and contextual data. The success of mobile wearable technology depends on communication and networking architectures that support efficient and secure end-to-end information flows. A key design consideration of future wearable devices is the ability to ubiquitously connect to smartphones or the Internet with very low energy consumption. Radio propagation and, accordingly, channel models are also different from those in other existing wireless technologies. A huge number of connected wearable devices require novel big data processing algorithms, efficient storage solutions, cloud-assisted infrastructures, and spectrum-efficient communications technologies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The republican idea of non-domination stresses the importance of certain social relationships for a person’s freedom, showing that freedom is a social-relational state. While the idea of freedom as non-domination receives a lot of attention in the literature, republican theorists say surprisingly little about equality. Therefore, the aim of this paper is to carve out the contours of a republican conception of equality.. In so doing, I will argue that republican accounts of equality share a significant normative overlap with the idea of social equality. However, closer analysis of Philip Pettit’s account of ‘expressive egalitarianism’ (which Pettit sees as inherently connected to non-domination) and recent theories of social equality shows that republican non-domination – in contrast to what Pettit seems to claim – is not sufficient for securing (republican) social equality. In order to secure social equality for all, republicans would have to go beyond non-domination.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report provides an overview of the research evidence on the relationship between poverty and ethnicity in Northern Ireland. After a period of increasing ethnic diversity, the review was concerned with understanding how issues of poverty affect people from different minority ethnic communities and their ability to access and secure good outcomes from key services. A comprehensive literature review and focus groups with people from the Roma, Somali, Chinese and Polish communities, and with local stakeholders, provide the basis for the report. The report discusses: • how new migrants have joined long-standing communities of people from minority ethnic groups; • how the policy framework to address racial inequalities in Northern Ireland is relatively new; • how people from minority ethnic groups experience low incomes and access services; and • how the legacy of conflict in the region may affect minority ethnic groups.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This review article considers Samuel Moyn’s book The Last Utopia:Human Rights in History in the context of recent trends in the writing of human rights history. A central debate among historians of human rights, in seekingto account for the genesis and spread of human rights, is how far current humanrights practice demonstrates continuity or radical discontinuity with previousattempts to secure rights. Moyn’s discontinuity thesis and the controversysurrounding it exemplify this debate. Whether Moyn is correct is importantbeyond the confines of human rights historiography, with implications for theirmeaning in law, as well as their political legitimacy. This review argues that Moyn’s book ultimately fails to convince, for two broad reasons. First, a more balanced judgment would conclude that the history of human rights is both one of continuity and discontinuity. Second, and more importantly, Moyn fails to offer a convincing account of the normativity of human rights. Undertaking a history of human rights requires a deeper engagement with debates on the nature and validity of human rights than Moyn seems prepared to contemplate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The future of Belfast is found in its plans – beginning with 1945 planning proposals to the recently adopted Belfast Metropolitan Area Plan, these documents have aimed to encourage and channel urban development processes to secure collective outcomes that enhance the public interest. Central to this objective has been the idea of ‘development’ and in this paper we interrogate the representation of this concept in the urban discourse of Belfast. We seek to do this by first exploring how ‘development’ and associated concepts are articulated in key spatial policy documents and then contrast these with examples of some of the key physical, spatial outcomes of economic processes that have occurred in the last ten years. The paper will review the dominant trajectories of urban change in Belfast, consider their implications and relate these to the official goals and aspirations represented in planning strategies and regeneration visions for the city. In doing this we draw on the recent work of Marcuse (2015) to identify how ideas of ‘development’ and ‘growth’ have been used to anonymise, harmonize and homogenise the outcomes of these spatial processes. The paper will conclude by considering how Belfast’s urban discourse acts to suppresses alternative visions of the city and explores the potential consequences of this for the new governance arrangements for planning in Belfast.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Directional modulation (DM), as a promising physical-layer security technique, is able to secure wireless communications by virtue of the property of its direction-dependent signal modulation format transmission. Here modulated signal waveform signatures can only be detected by legitimate receiver(s) positioned along a-prior assigned directions. This paper reviews the development in DM technology over recent years, and provides some recommendations for future studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New Irish speakers in Belfast play a crucial, complex part in the revitalization and change of both the city and Irish within Northern Ireland. This paper examines the role of new Irish speakers in transforming Belfast, whose emergence from a post-conflict period involves a reassessment of communal cultural expressions. Markers of ethno-national identity are bitterly contentious locally, and yet increasingly celebrated, in line with international trends, as high status cultural forms and potentially profitable tourist attractions. Irish in Belfast currently occupies an ambiguous position: divisive enough for a sign reading ‘Happy Christmas’ in Irish to be experienced as an insult by some city councillors, yet a secure enough part of the establishment for a neighbourhood to be officially rebranded as the Gaeltacht Quarter.
When, how and where new Irish speakers use the language in Belfast has implications for the relationship of Irishness to the Northern Irish state and for the place of Belfast within regional frameworks across the UK, Ireland and Europe. Adult learners and young people exiting Irish medium education have an impact on life in Belfast beyond its small population of Irish speakers. Urbanisation fuelled by new speakers, which shifts the balance of Irish language resources and speakers away from traditional rural Gaeltacht areas and towards cities, also has implications for the language itself. Recent increase in new Irish speakers in Belfast is due to expansion in the Irish-medium sector as well as to adult learners, whose decisions contribute to the school expansion.
Urbanisation, multilingualism and intergenerational shift combine in Belfast to produce new linguistic norms. Moreover, in a minority language community where hierarchies of ‘authenticity’ are weighted towards the rural and the native speaker, where the rural and the native have traditionally been conflated, and where indigeneity is a central concept to contested nationalisms, the emergence of a self-confident, youthful Irish speaking community in Northern Ireland’s biggest city involves a recalibration of the qualities signifying ‘gaelicness’. As students, professionals, hobbyists and activists, new Irish speakers in Belfast occupy a vital position at the crux of changing ideas about place, language and identity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: The need for structured education programmes for type 2 diabetes is a high priority for many governments around the world. One such national education programme in the United Kingdom is the DESMOND Programme, which has been shown to be robust and effective for patients in general. However, these programmes are not generally targeted to people with intellectual disabilities (ID), and robust evidence on their effects for this population is lacking. We have adapted the DESMOND Programme for people with ID and type 2 diabetes to produce an amended programme known as DESMOND-ID. This protocol is for a pilot trial to determine whether a large-scale randomised trial is feasible, to test if DESMOND-ID is more effective than usual care in adults with ID for self-management of their type 2 diabetes, in particular as a means to reduce glycated haemoglobin (Hb1Ac), improve psychological wellbeing and quality of life and promote a healthier lifestyle. This protocol describes the rationale, methods, proposed analysis plan and organisational and administrative details.

METHODS/DESIGN: This trial is a two arm, individually randomised, pilot trial for adults with ID and type 2 diabetes, and their family and/or paid carers. It compares the DESMOND-ID programme with usual care. Approximately 36 adults with mild to moderate ID will be recruited from three countries in the United Kingdom. Family and/or paid carers may also participate in the study. Participants will be randomly assigned to one of two conditions using a secure computerised system with robust allocation concealment. A range of data will be collected from the adults with ID (biomedical, psychosocial and self-management strategies) and from their carers. Focus groups with all the participants will assess the acceptability of the intervention and the trial.

DISCUSSION: The lack of appropriate structured education programmes and educational materials for this population leads to secondary health conditions and may lead to premature deaths. There are significant benefits to be gained globally, if structured education programmes are adapted and shown to be successful for people with ID and other cognitive impairments.

TRIAL REGISTRATION: Registered with International Standard Randomised Controlled Trial (identifier: ISRCTN93185560 ) on 10 November 2014.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background:
Prolonged mechanical ventilation is associated with a longer intensive care unit (ICU) length of stay and higher mortality. Consequently, methods to improve ventilator weaning processes have been sought. Two recent Cochrane systematic reviews in ICU adult and paediatric populations concluded that protocols can be effective in reducing the duration of mechanical ventilation, but there was significant heterogeneity in study findings. Growing awareness of the benefits of understanding the contextual factors impacting on effectiveness has encouraged the integration of qualitative evidence syntheses with effectiveness reviews, which has delivered important insights into the reasons underpinning (differential) effectiveness of healthcare interventions.

Objectives:
1. To locate, appraise and synthesize qualitative evidence concerning the barriers and facilitators of the use of protocols for weaning critically-ill adults and children from mechanical ventilation;

2. To integrate this synthesis with two Cochrane effectiveness reviews of protocolized weaning to help explain observed heterogeneity by identifying contextual factors that impact on the use of protocols for weaning critically-ill adults and children from mechanical ventilation;

3. To use the integrated body of evidence to suggest the circumstances in which weaning protocols are most likely to be used.

Search methods:
We used a range of search terms identified with the help of the SPICE (Setting, Perspective, Intervention, Comparison, Evaluation) mnemonic. Where available, we used appropriate methodological filters for specific databases. We searched the following databases: Ovid MEDLINE, Embase, OVID, PsycINFO, CINAHL Plus, EBSCOHost, Web of Science Core Collection, ASSIA, IBSS, Sociological Abstracts, ProQuest and LILACS on the 26th February 2015. In addition, we searched: the grey literature; the websites of professional associations for relevant publications; and the reference lists of all publications reviewed. We also contacted authors of the trials included in the effectiveness reviews as well as of studies (potentially) included in the qualitative synthesis, conducted citation searches of the publications reporting these studies, and contacted content experts.

We reran the search on 3rd July 2016 and found three studies, which are awaiting classification.

Selection criteria:
We included qualitative studies that described: the circumstances in which protocols are designed, implemented or used, or both, and the views and experiences of healthcare professionals either involved in the design, implementation or use of weaning protocols or involved in the weaning of critically-ill adults and children from mechanical ventilation not using protocols. We included studies that: reflected on any aspect of the use of protocols, explored contextual factors relevant to the development, implementation or use of weaning protocols, and reported contextual phenomena and outcomes identified as relevant to the effectiveness of protocolized weaning from mechanical ventilation.

Data collection and analysis:
At each stage, two review authors undertook designated tasks, with the results shared amongst the wider team for discussion and final development. We independently reviewed all retrieved titles, abstracts and full papers for inclusion, and independently extracted selected data from included studies. We used the findings of the included studies to develop a new set of analytic themes focused on the barriers and facilitators to the use of protocols, and further refined them to produce a set of summary statements. We used the Confidence in the Evidence from Reviews of Qualitative Research (CERQual) framework to arrive at a final assessment of the overall confidence of the evidence used in the synthesis. We included all studies but undertook two sensitivity analyses to determine how the removal of certain bodies of evidence impacted on the content and confidence of the synthesis. We deployed a logic model to integrate the findings of the qualitative evidence synthesis with those of the Cochrane effectiveness reviews.

Main results:
We included 11 studies in our synthesis, involving 267 participants (one study did not report the number of participants). Five more studies are awaiting classification and will be dealt with when we update the review.

The quality of the evidence was mixed; of the 35 summary statements, we assessed 17 as ‘low’, 13 as ‘moderate’ and five as ‘high’ confidence. Our synthesis produced nine analytical themes, which report potential barriers and facilitators to the use of protocols. The themes are: the need for continual staff training and development; clinical experience as this promotes felt and perceived competence and confidence to wean; the vulnerability of weaning to disparate interprofessional working; an understanding of protocols as militating against a necessary proactivity in clinical practice; perceived nursing scope of practice and professional risk; ICU structure and processes of care; the ability of protocols to act as a prompt for shared care and consistency in weaning practice; maximizing the use of protocols through visibility and ease of implementation; and the ability of protocols to act as a framework for communication with parents.

Authors' conclusions:
There is a clear need for weaning protocols to take account of the social and cultural environment in which they are to be implemented. Irrespective of its inherent strengths, a protocol will not be used if it does not accommodate these complexities. In terms of protocol development, comprehensive interprofessional input will help to ensure broad-based understanding and a sense of ‘ownership’. In terms of implementation, all relevant ICU staff will benefit from general weaning as well as protocol-specific training; not only will this help secure a relevant clinical knowledge base and operational understanding, but will also demonstrate to others that this knowledge and understanding is in place. In order to maximize relevance and acceptability, protocols should be designed with the patient profile and requirements of the target ICU in mind. Predictably, an under-resourced ICU will impact adversely on protocol implementation, as staff will prioritize management of acutely deteriorating and critically-ill patients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

WHIRLBOB, also known as STRIBOBr2, is an AEAD (Authenticated Encryption with Associated Data) algorithm derived from STRIBOBr1 and the Whirlpool hash algorithm. WHIRLBOB/STRIBOBr2 is a second round candidate in the CAESAR competition. As with STRIBOBr1, the reduced-size Sponge design has a strong provable security link with a standardized hash algorithm. The new design utilizes only the LPS or ρ component of Whirlpool in flexibly domain-separated BLNK Sponge mode. The number of rounds is increased from 10 to 12 as a countermeasure against Rebound Distinguishing attacks. The 8 ×8 - bit S-Box used by Whirlpool and WHIRLBOB is constructed from 4 ×4 - bit “MiniBoxes”. We report on fast constant-time Intel SSSE3 and ARM NEON SIMD WHIRLBOB implementations that keep full miniboxes in registers and access them via SIMD shuffles. This is an efficient countermeasure against AES-style cache timing side-channel attacks. Another main advantage of WHIRLBOB over STRIBOBr1 (and most other AEADs) is its greatly reduced implementation footprint on lightweight platforms. On many lower-end microcontrollers the total software footprint of π+BLNK = WHIRLBOB AEAD is less than half a kilobyte. We also report an FPGA implementation that requires 4,946 logic units for a single round of WHIRLBOB, which compares favorably to 7,972 required for Keccak / Keyak on the same target platform. The relatively small S-Box gate count also enables efficient 64-bit bitsliced straight-line implementations. We finally present some discussion and analysis on the relationships between WHIRLBOB, Whirlpool, the Russian GOST Streebog hash, and the recent draft Russian Encryption Standard Kuznyechik.