964 resultados para Secure Authentication for Broadcast (DNP3-SAB)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: This qualitative study aims to provide insight into how Australian New Graduate Nurses (NGNs) experienced their transition to acute care nursing practice. Method: Nine NGNs each participated in three in-depth interviews conducted across their first year of practice. Constant comparative analysis was used to identify the emergent themes. Findings: The desire to fit in (establishment of secure social bonds) with ward staff is an important element of NGN transition experiences. Fitting in was about feeling one's self to be part of a social group, and participants made it clear that their perceptions of their success in establishing secure and meaningful social bonds in each new ward was extremely important for their sense of being as NGNs. Current NGN Transition Programmes (NGNTPs) involve multiple ward rotations, increasing the demand for the NGN to fit in. Thus participants were engaged in a deeply personal transition experience that was not necessarily aligned with multiple ward rotations. Conclusions: Although NGNTPs have the word “transition” in their title, it may be that current programmes are more focussed on organisations’ desire to “orient” NGNs to working within the acute care setting than facilitating personal transitions to practice. Further investigation of the impact of NGNTPs on NGNs and the associated multiple ward rotations is required.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The design grows out of the rich culture of circus and the rugged dynamic topography of Chongqing. The site for this project is nestled on the banks of the mighty Yangzte, China's longest river: a vast sweeping watery ribbon carving its way through the mountainous terrain. This swirling sinuous environmental thread replicates in nature the tweisting ribbons circling the gyrating circus gymnast. The project grows from intertwining these swirling parallel conceptions of 'ribbon'. A multi-layered envelope of glass and steel ribbons creates a dome like enclosure that wraps itself around the dynamic performing heart of the circus. The main auditorium and stage area are accommodated in this space. Key public elements and facilities are located adjacent to the new riverfront boulevard maximising the positive relationship with this attractive landscape zone. Service and support areas are located along the southern boundary. Key Statistics; Client: Chongqing Broadcast Bureau Developer: Chongqing Real Estate Site: 3.3 Ha Development: Total G.F.A.: 36,800m2 Project Cost: Total Investment: RMB 300 Million (A$48 million) Other competition participants were BIG-Bjarke Ingels Group (Denmark)/arquitectonica (USA)/Beijing Architectural Design Institute/East China Architectural Design Institute/China Architectural Design Academy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attachment difficulties have been proposed as a key risk factor for the development of alexithymia, a multifaceted personality trait characterised by difficulties identifying and describing feelings, a lack of imagination and an externally oriented thinking style. The present study investigated the relationship between attachment and alexithymia in an alcohol dependent population. Participants were 210 outpatients in a Cognitive Behavioural Treatment Program assessed on the Toronto Alexithymia Scale (TAS-20) and the Revised Adult Attachment Scale (RAAS). Significant relationships between anxious attachment and alexithymia factors were confirmed. Furthermore, alexithymic alcoholics reported significantly higher levels of anxious attachment and significantly lower levels of closeness (secure attachment) compared to non-alexithymic alcoholics. These findings highlight the importance of assessing and targeting anxious attachment among alexithymic alcoholics in order to improve alcohol treatment outcomes. Keywords: Attachment, alexithymia, alcohol dependence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The relationship between radiologic union and clinical outcome in thoracoscopic scoliosis surgery is not clear, as apparent non-union of a spinal fusion does not always correspond to a poor clinical result. The aim of this study was to evaluate CT fusion rates 2yrs after thoracoscopic surgery, and to explore the relationship between fusion scores and rod diameter, graft type, fusion level, implant failure, and lateral position in the disc space. This study suggests that moderate fusion scores secure successful clinical outcomes in thoracoscopic scoliosis surgery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Power system dynamic analysis and security assessment are becoming more significant today due to increases in size and complexity from restructuring, emerging new uncertainties, integration of renewable energy sources, distributed generation, and micro grids. Precise modelling of all contributed elements/devices, understanding interactions in detail, and observing hidden dynamics using existing analysis tools/theorems are difficult, and even impossible. In this chapter, the power system is considered as a continuum and the propagated electomechanical waves initiated by faults and other random events are studied to provide a new scheme for stability investigation of a large dimensional system. For this purpose, the measured electrical indices (such as rotor angle and bus voltage) following a fault in different points among the network are used, and the behaviour of the propagated waves through the lines, nodes, and buses is analyzed. The impact of weak transmission links on a progressive electromechanical wave using energy function concept is addressed. It is also emphasized that determining severity of a disturbance/contingency accurately, without considering the related electromechanical waves, hidden dynamics, and their properties is not secure enough. Considering these phenomena takes heavy and time consuming calculation, which is not suitable for online stability assessment problems. However, using a continuum model for a power system reduces the burden of complex calculations

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Relics is a single-channel video derived from a 3D computer animation that combines a range of media including photography, drawing, painting, and pre-shot video. It is constructed around a series of pictorial stills which become interlinked by the more traditionally filmic processes of panning, zooming and crane shots. In keeping with these ideas, the work revolves around a series of static architectural forms within the strangely menacing enclosure of a geodesic dome. These clinical aspects of the work are complemented by a series of elements that evoke fluidity : fireworks, mirrored biomorphic forms and oscillating projections. The visual dimension of the work is complemented by a soundtrack of rainforest bird calls. Through its ambiguous combination of recorded and virtual imagery, Relics explores the indeterminate boundaries between real and virtual space. On the one hand, it represents actual events and spaces drawn from the artist studio and image archive; on the other it represents the highly idealised spaces of drawing and 3D animation. In this work the disembodied wandering virtual eye is met with an uncanny combination of scenes, where scale and the relationships between objects are disrupted and changed. Through this simultaneity between the real and the virtual, the work conveys a disembodied sense of space and time that carries a powerful sense of affect. Relics was among the first international examples of 3D animation technology in contemporary art. It was originally exhibited in the artist’s solo show, ‘Places That Don’t Exist’ (2007, George Petelin Gallery, Gold Coast) and went on to be included in the group shows ‘d/Art 07/Screen: The Post Cinema Experience’ (2007, Chauvel Cinema, Sydney) , ‘Experimenta Utopia Now: International Biennial of Media Art’ (2010, Arts Centre, Melbourne and national touring venues) and ‘Move on Asia’ (2009, Alternative space Loop, Seoul and Para-site Art Space, Hong Kong) and was broadcast on Souvenirs from Earth (Video Art Cable Channel, Germany and France). The work was analysed in catalogue texts for ‘Places That Don’t Exist’ (2007), ‘d/Art 07’ (2007) and ‘Experimenta Utopia Now’ (2010) and the’ Souvenirs from Earth’ website.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter reviews the incidence of coverage of Papua New Guinea affairs in the Australian press and in Australian broadcast media. It presents the findings of a formal monitoring of selected newspaper coverage and news broadcasts of the leading Australian television and radio outlets. The study also includes news stories published on ABC Online. The findings for print media suggest that coverage of PNG is inadequate and may be contributing towards negative images of that country in Australia. The broadcast monitoring found also that beyond the ABC's regular and balanced coverage, there was very little mention of PNG on Australian airwaves. The deployment of resources by the ABC was seen as a potential model for increased quantity and quality of coverage, with its maintenance of a correspondent and office in the country, and use of reports from PNG across a wide range of programs. The investigation noted some early indications of a shift in media attention, following the election of a new government in Australia in 2007, which gave some priority attention to PNG including a visit by the then Prime Minister.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article investigates the complex phenomenon of major gift giving to charitable institutions. Drawing on empirical evidence from interviews with 16 Australian major donors (who gave a single gift of at least AU$10,000 in 2008 or 2009), we seek to better understand donor expectations and (dis)satisfaction. Given growing need for social services, and the competition among nonprofit organisations (NPOs) to secure sustainable funding, this research is particularly timely. Currently, little is known about major donors’ expectations, wants and needs. Equity theory, with the concept of reciprocity at its core, was found to provide a useful framework for understanding these phenomena. A model of equitable major gift relationships was developed from the data, which portrays balanced relationships and identifies potential areas of dissatisfaction for major donors. We conclude by offering suggestions for NPOs seeking to understand the complexities of major gift relationships, with practical implications for meeting donors’ needs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Book summary: In a constantly evolving context of performance management, accountability and risk assessment, police organisations and frontline police officers are required to pay careful attention to what has come to be known as ‘at risk people’, ‘vulnerable populations’ or ‘vulnerable people’. Vulnerable people have become a key focus of policy. Concurrently, there have been stronger demands on police, and a steep increase in police powers in relation to their interaction with vulnerable people. The premise of this protectionist and interventionist agenda is threefold: to protect the rights of vulnerable individuals proactively cater for their vulnerability within the justice system; and to secure police operations and protocols within strict guidelines. This collection unpacks ‘vulnerable people policing’ in theory and practice and guides the reader through the policing process as it is experienced by police officers, victims, offenders, witnesses and justice stakeholders. Each chapter features a single step of the policing process: from police recruit education through to custody, and the final transfer of vulnerable people to courts and sentencing. This edited collection provides analytical, theoretical and empirical insights on vulnerable people policing, and reflects on critical issues in a domain that is increasingly subject to speedy conversion from policy to practice, and heightened media and political scrutiny. It breaks down policing practices, operations and procedures that have vulnerable populations as a focus, bringing together original and innovative academic research and literature, practitioner experience and discussion of policy implications (from local and international perspectives). The particular nature of this collection highlights the multi-disciplinary nature of police work, sheds light on how specific, mandatory policies guide police officers steps in their interaction with vulnerable populations, and discusses the practicalities of police decision making at key points in this process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation examines the compliance and performance of a large sample of faith based (religious) ethical funds - the Shari'ah-compliant equity funds (SEFs), which may be viewed as a form of ethical investing. SEFs screen their investment for compliance with Islamic law, where riba (conventional interest expense), maysir (gambling), gharar (excessive uncertainty), and non-halal (non-ethical) products are prohibited. Using a set of stringent Shari'ah screens similar to those of MSCI Islamic, we first examine the extent to which SEFs comply with the Shari'ah law. Results show that only about 27% of the equities held by SEFs are Shari'ah-compliant. While most of the fund holdings pass the business screens, only about 42% pass the total debt to total assets ratio screen. This finding suggests that, in order to overcome a significant reduction in the investment opportunity, Shari'ah principles are compromised, with SEFs adopting lax screening rules so as to achieve a financial performance. While younger funds and funds that charge higher fees and are domiciled in more Muslim countries are more Shari'ah-compliant, we find little evidence of a positive relationship between fund disclosure of the Shari'ah compliance framework and Shari'ah-compliance. Clearly, Shari'ah compliance remains a major challenge for fund managers and SEF investors should be aware of Shari'ah-compliance risk since the fund managers do not always fulfill their fiduciary obligation, as promised in their prospectus. Employing a matched firm approach for a survivorship free sample of 387 SEFs, we then examine an issue that has been heavily debated in the literature: Does ethical screening reduce investment performance? Results show that it does but only by an average of 0.04% per month if benchmarked against matched conventional funds - this is a relatively small price to pay for religious faith. Cross-sectional regressions show an inverse relationship between Shari'ah compliance and fund performance: every one percentage increase in total compliance decreases fund performance by 0.01% per month. However, compliance fails to explain differences in the performance between SEFs and matched funds. Although SEFs do not generally perform better during crisis periods, further analysis shows evidence of better performance relative to conventional funds only during the recent Global Financial Crisis; the latter is consistent with popular media claims.