944 resultados para Routing protocols


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – Virtual prototyping technologies linked to building information models are commonplace within the aeronautical and automotive industries. Their use within the construction industry is now emerging. The purpose of this paper is to show how these technologies have been adopted on the pre-tender planning for a typical construction project. Design/methodology/approach – The research methodology taken was an “action research” approach where the researchers and developers were actively involved in the production of the virtual prototypes on behalf of the contractor thereby gaining consistent access to the decisions of the planning staff. The experiences from the case study were considered together with similar research on other construction projects. Findings – The findings from the case studies identify the role of virtual prototyping in components modelling, site modelling, construction equipment modelling, temporary works modelling, construction method visualization and method verification processes. Originality/value – The paper presents a state-of-the-art review and discusses the implications for the tendering process as these technologies are adopted. The adoption of the technologies will lead to new protocols and changes in the procurement of buildings and infrastructure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There exists a general consensus in the science education literature around the goal of enhancing students. and teachers. views of nature of science (NOS). An emerging area of research in science education explores NOS and argumentation, and the aim of this study was to explore the effectiveness of a science content course incorporating explicit NOS and argumentation instruction on preservice primary teachers. views of NOS. A constructivist perspective guided the study, and the research strategy employed was case study research. Five preservice primary teachers were selected for intensive investigation in the study, which incorporated explicit NOS and argumentation instruction, and utilised scientific and socioscientific contexts for argumentation to provide opportunities for participants to apply their NOS understandings to their arguments. Four primary sources of data were used to provide evidence for the interpretations, recommendations, and implications that emerged from the study. These data sources included questionnaires and surveys, interviews, audio- and video-taped class sessions, and written artefacts. Data analysis involved the formation of various assertions that informed the major findings of the study, and a variety of validity and ethical protocols were considered during the analysis to ensure the findings and interpretations emerging from the data were valid. Results indicated that the science content course was effective in enabling four of the five participants. views of NOS to be changed. All of the participants expressed predominantly limited views of the majority of the examined NOS aspects at the commencement of the study. Many positive changes were evident at the end of the study with four of the five participants expressing partially informed and/or informed views of the majority of the examined NOS aspects. A critical analysis of the effectiveness of the various course components designed to facilitate the development of participants‟ views of NOS in the study, led to the identification of three factors that mediated the development of participants‟ NOS views: (a) contextual factors (including context of argumentation, and mode of argumentation), (b) task-specific factors (including argumentation scaffolds, epistemological probes, and consideration of alternative data and explanations), and (c) personal factors (including perceived previous knowledge about NOS, appreciation of the importance and utility value of NOS, and durability and persistence of pre-existing beliefs). A consideration of the above factors informs recommendations for future studies that seek to incorporate explicit NOS and argumentation instruction as a context for learning about NOS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital Songlines (DSL) is an Australasian CRC for Interaction Design (ACID) project that is developing protocols, methodologies and toolkits to facilitate the collection, education and sharing of indigenous cultural heritage knowledge. This paper outlines the goals achieved over the last three years in the development of the Digital Songlines game engine (DSE) toolkit that is used for Australian Indigenous storytelling. The project explores the sharing of indigenous Australian Aboriginal storytelling in a sensitive manner using a game engine. The use of the game engine in the field of Cultural Heritage is expanding. They are an important tool for the recording and re-presentation of historically, culturally, and sociologically significant places, infrastructure, and artefacts, as well as the stories that are associated with them. The DSL implementation of a game engine to share storytelling provides an educational interface. Where the DSL implementation of a game engine in a CH application differs from others is in the nature of the game environment itself. It is modelled on the 'country' (the 'place' of their heritage which is so important to the clients' collective identity) and authentic fauna and flora that provides a highly contextualised setting for the stories to be told. This paper provides an overview on the development of the DSL game engine.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chronic wounds are a significant socioeconomic problem for governments worldwide. Approximately 15% of people who suffer from diabetes will experience a lower-limb ulcer at some stage of their lives, and 24% of these wounds will ultimately result in amputation of the lower limb. Hyperbaric Oxygen Therapy (HBOT) has been shown to aid the healing of chronic wounds; however, the causal reasons for the improved healing remain unclear and hence current HBOT protocols remain empirical. Here we develop a three-species mathematical model of wound healing that is used to simulate the application of hyperbaric oxygen therapy in the treatment of wounds. Based on our modelling, we predict that intermittent HBOT will assist chronic wound healing while normobaric oxygen is ineffective in treating such wounds. Furthermore, treatment should continue until healing is complete, and HBOT will not stimulate healing under all circumstances, leading us to conclude that finding the right protocol for an individual patient is crucial if HBOT is to be effective. We provide constraints that depend on the model parameters for the range of HBOT protocols that will stimulate healing. More specifically, we predict that patients with a poor arterial supply of oxygen, high consumption of oxygen by the wound tissue, chronically hypoxic wounds, and/or a dysfunctional endothelial cell response to oxygen are at risk of nonresponsiveness to HBOT. The work of this paper can, in some way, highlight which patients are most likely to respond well to HBOT (for example, those with a good arterial supply), and thus has the potential to assist in improving both the success rate and hence the costeffectiveness of this therapy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective The review addresses two distinct sets of issues: 1. specific functionality, interface, and calculation problems that presumably can be fixed or improved; and 2. the more fundamental question of whether the system is close to being ready for ‘commercial prime time’ in the North American market. Findings Many of our comments relate to the first set of issues, especially sections B and C. Sections D and E deal with the second set. Overall, we feel that LCADesign represents a very impressive step forward in the ongoing quest to link CAD with LCA tools and, more importantly, to link the world of architectural practice and that of environmental research. From that perspective, it deserves continued financial support as a research project. However, if the decision is whether or not to continue the development program from a purely commercial perspective, we are less bullish. In terms of the North American market, there are no regulatory or other drivers to press design teams to use a tool of this nature. There is certainly interest in this area, but the tools must be very easy to use with little or no training. Understanding the results is as important in this regard as knowing how to apply the tool. Our comments are fairly negative when it comes to that aspect. Our opinion might change to some degree when the ‘fixes’ are made and the functionality improved. However, as discussed in more detail in the following sections, we feel that the multi-step process — CAD to IFC to LCADesign — could pose a serious problem in terms of market acceptance. The CAD to IFC part is impossible for us to judge with the information provided, and we can’t even begin to answer the question about the ease of using the software to import designs, but it appears cumbersome from what we do know. There does appear to be a developing North American market for 3D CAD, with a recent survey indicating that about 50% of the firms use some form of 3D modeling for about 75% of their projects. However, this does not mean that full 3D CAD is always being used. Our information suggests that AutoDesk accounts for about 75 to 80% of the 3D CAD market, and they are very cautious about any links that do not serve a latent demand. Finally, other system that link CAD to energy simulation are using XML data transfer protocols rather than IFC files, and it is our understanding that the market served by AutoDesk tends in that direction right now. This is a subject that is outside our area of expertise, so please take these comments as suggestions for more intensive market research rather than as definitive findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project report presents the results of a study on wireless communication data transfer rates for a mobile device running a custombuilt construction defect reporting application. The study measured the time taken to transmit data about a construction defect, which included digital imagery and text, in order to assess the feasibility of transferring various types and sizes of data and the ICT-supported construction management applications that could be developed as a consequence. Data transfer rates over GPRS through the Telstra network and WiFi over a private network were compared. Based on the data size and data transfer time, the rate of transfer was calculated to determine the actual data transmission speeds at which the information was being sent using the wireless mobile communication protocols. The report finds that the transmission speeds vary considerably when using GPRS and can be significantly slower than what is advertised by mobile network providers. While WiFi is much faster than GPRS, the limited range of WiFi limits the protocol to residential-scale construction sites.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Controlling the definition of what was essentially a subjugated culture, the colonisers reserve the power to distinguish authentic aspects of the living traditions of the colonised. If the colonised argue political demands by reference to their culture, the colonisers are quick to adjudicate what is genuine in such claims. (Fannon, 1967) Since colonial invasions, Australia’s Indigenous people have weathered rapid change. While the origins of Australia’s Indigenous peoples continues to be an archaeological interest for many, how Indigenous cultures have survived, transformed and retained a sense of ‘difference’ is fundamental to understanding the diversity of Aboriginal and Torres Strait Islander cultures within this continent as both contemporaneous and historical. It is important that teachers, students and researchers within Indigenous studies remind themselves that much of the literature on Aboriginal and Torres Strait Islanders can be ideologically traced back to the emergence of ‘knowledge’ about native peoples in the context of European imperialism and expansion from the fifteenth century. Care must therefore be taken in not conveying ‘scientific’ rational knowledge as perhaps the hidden agenda or notion of assumptions of European ‘superiority’ and non-European inferiority. The recognition by the High Court of Australia (1992) abandoned the legal myth of terra nullius which based the dispossession of Indigenous land on the basis of it being considered an empty land. It could also be argued that this decision recognised that distinct customs and traditions continue to exist within the social and cultural ‘knowledge’ of Indigenous peoples of Australia. General issues and concerns relating to research design, methodology and articulation within QUT are not just confined to this university and the research project presented as a case study but are important in dealing with how Aboriginal and Torres Strait Islander students and academics participate or are employed within the university. We feel that the design and methodology of research that either covertly or overtly focuses on Indigenous Australians can no longer presume that all research will naturally follow protocols that are culturally appropriate as this appropriateness is usually defined by the institution. By no means do we feel that research should be debilitated as a result of raising these issues, but that collaborative approaches within the ‘process’ of research will address Aboriginal and Torres Strait Islander people and communities as much as the intended outcomes of research itself.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the use of randomness extraction and expansion in key agreement (KA) pro- tocols to generate uniformly random keys in the standard model. Although existing works provide the basic theorems necessary, they lack details or examples of appropriate cryptographic primitives and/or parameter sizes. This has lead to the large amount of min-entropy needed in the (non-uniform) shared secret being overlooked in proposals and efficiency comparisons of KA protocols. We therefore summa- rize existing work in the area and examine the security levels achieved with the use of various extractors and expanders for particular parameter sizes. The tables presented herein show that the shared secret needs a min-entropy of at least 292 bits (and even more with more realistic assumptions) to achieve an overall security level of 80 bits using the extractors and expanders we consider. The tables may be used to �nd the min-entropy required for various security levels and assumptions. We also �nd that when using the short exponent theorems of Gennaro et al., the short exponents may need to be much longer than they suggested.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Queensland University of Technology (QUT) is faced with a rapidly growing research agenda built upon a strategic research capacity-building program. This presentation will outline the results of a project that has recently investigated QUT’s research support requirements and which has developed a model for the support of eResearch across the university. QUT’s research building strategy has produced growth at the faculty level and within its research institutes. This increased research activity is pushing the need for university-wide eResearch platforms capable of providing infrastructure and support in areas such as collaboration, data, networking, authentication and authorisation, workflows and the grid. One of the driving forces behind the investigation is data-centric nature of modern research. It is now critical that researchers have access to supported infrastructure that allows the collection, analysis, aggregation and sharing of large data volumes for exploration and mining in order to gain new insights and to generate new knowledge. However, recent surveys into current research data management practices by the Australian Partnership for Sustainable Repositories (APSR) and by QUT itself, has revealed serious shortcomings in areas such as research data management, especially its long term maintenance for reuse and authoritative evidence of research findings. While these internal university pressures are building, at the same time there are external pressures that are magnifying them. For example, recent compliance guidelines from bodies such as the ARC, and NHMRC and Universities Australia indicate that institutions need to provide facilities for the safe and secure storage of research data along with a surrounding set of policies, on its retention, ownership and accessibility. The newly formed Australian National Data Service (ANDS) is developing strategies and guidelines for research data management and research institutions are a central focus, responsible for managing and storing institutional data on platforms that can be federated nationally and internationally for wider use. For some time QUT has recognised the importance of eResearch and has been active in a number of related areas: ePrints to digitally publish research papers, grid computing portals and workflows, institutional-wide provisioning and authentication systems, and legal protocols for copyright management. QUT also has two widely recognised centres focused on fundamental research into eResearch itself: The OAK LAW project (Open Access to Knowledge) which focuses upon legal issues relating eResearch and the Microsoft QUT eResearch Centre whose goal is to accelerate scientific research discovery, through new smart software. In order to better harness all of these resources and improve research outcomes, the university recently established a project to investigate how it might better organise the support of eResearch. This presentation will outline the project outcomes, which include a flexible and sustainable eResearch support service model addressing short and longer term research needs, identification of resource requirements required to establish and sustain the service, and the development of research data management policies and implementation plans.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Citrus canker is a disease of citrus and closely related species, caused by the bacterium Xanthomonas citri subsp. citri. This disease, previously exotic to Australia, was detected on a single farm [infested premise-1, (IP1). IP is the terminology used in official biosecurity protocols to describe a locality at which an exotic plant pest has been confirmed or is presumed to exist. IP are numbered sequentially as they are detected] in Emerald, Queensland in July 2004. During the following 10 months the disease was subsequently detected on two other farms (IP2 and IP3) within the same area and studies indicated the disease first occurred on IP1 and spread to IP2 and IP3. The oldest, naturally infected plant tissue observed on any of these farms indicated the disease was present on IP1 for several months before detection and established on IP2 and IP3 during the second quarter (i.e. autumn) 2004. Transect studies on some IP1 blocks showed disease incidences ranged between 52 and 100% (trees infected). This contrasted to very low disease incidence, less than 4% of trees within a block, on IP2 and IP3. The mechanisms proposed for disease spread within blocks include weather-assisted dispersal of the bacterium (e.g. wind-driven rain) and movement of contaminated farm equipment, in particular by pivot irrigator towers via mechanical damage in combination with abundant water. Spread between blocks on IP2 was attributed to movement of contaminated farm equipment and/or people. Epidemiology results suggest: (i) successive surveillance rounds increase the likelihood of disease detection; (ii) surveillance sensitivity is affected by tree size; and (iii) individual destruction zones (for the purpose of eradication) could be determined using disease incidence and severity data rather than a predefined set area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

President’s Report Hello fellow AITPM members, A few weeks ago we saw another example of all levels of Government pulling together in real time to try to deal with a major transport incident, this time it was container loads of ammonium nitrate falling off the Pacific Adventurer during Cyclone Hamish and the associated major oil spill due to piercing of its hull off Moreton Bay in southern Queensland. The oil spill was extensive, affecting beaches and estuaries from Moreton Island north to the Sunshine Coast; a coastal stretch of at least 60km. We saw the Queensland Government, Brisbane, Moreton Bay and Sunshine Coast Regional Council crews deployed quickly once the gravity of the situation was realised to clean up toxic oil on beaches and prevent extensive upstream contamination. Environmental agencies public and private were quick to respond to help affected wildlife. The Navy’s HMAS Yarra and another minesweeper were deployed to search for the containers in the coastal area in an effort to have them salvaged before all ammonium nitrate could leach into and harm marine habitat, which would have a substantial impact not only on that environment but also the fishing industry. all of this during the final fortnight before a State election.) While this could be branded as a maritime problem, the road transport and logistics system was crucial to the cleanup. The private vehicular ferries were enlisted to transport plant and equipment from Brisbane to Moreton Island. The plant themselves, such as graders, were drawn from road building and maintenance inventory. Hundreds of Councils’ staff were released from other activities to undertake the cleanup. While it will take some time for us to know the long term impacts of this incident, it seems difficult to fault “grassroots” government crews and their private counterparts, such as Island tourism staff, in the initial cleanup effort. From a traffic planning and management perspective, we should also remember that this sort of incident has happened on road and rail corridors in the past, albeit on lesser scales. It underlines that we do need to continue to protect communities, commercial interests, and the environment through rigorous heavy vehicle management, planning and management of dangerous goods routesincluding rail corridors through urban areas), and carefully considered incident and disaster recovery plans and protocols. I’d like to close in reminding everyone again that AITPM’s flagship event, the 2009 AITPM National Conference, Traffic Beyond Tomorrow, is being held in Adelaide from 5 to 7 August. SA Branch President Paul Morris informs me that we have had over 50 paper submissions to date, from which a very balanced and informative programme of sessions has been prepared. www.aitpm.com has all of the details about how to register, sponsor a booth, session, etc. Best regards all, Jon Bunker

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Diachasmimorpha kraussii (Hymenoptera: Braconidae: Opiinae) is a koinobiont larval parasitoid of dacine fruit flies of the genus Bactrocera (Diptera: Tephritidae) in its native range (Australia, Papua New Guinea, Solomon Islands). The wasp is a potentially important control agent for pest fruit flies, having been considered for both classical and inundative biological control releases. I investigated the host searching, selection and utilisation mechanisms of the wasp against native host flies within its native range (Australia). Such studies are rare in opiine research where the majority of studies, because of the applied nature of the research, have been carried out using host flies and environments which are novel to the wasps. Diachasmimorpha kraussii oviposited equally into maggots of four fruit fly species, all of which coexist with the wasp in its native range (Australia), when tested in a choice trial using a uniform artificial diet media. While eggs laid into Bactrocera tryoni and B. jarvisi developed successfully through to adult wasps, eggs laid into B. cucumis and B. cacuminata were encapsulated. These results suggest that direct larval cues are not an important element in host selection by D. kraussii. Further exploring how D. kraussii locates suitable host larvae, I investigated the role of plant cues in host searching and selection. This was examined in a laboratory choice trial using uninfested fruit or fruit infested with either B. tryoni or B. jarvisi maggots. The results showed a consistent preference ranking among infested fruits by the wasp, with guava and peach most preferred, but with no response to uninfested fruits. Thus, it appears the wasp uses chemical cues emitted in response to fruit fly larval infestation for host location, but does not use cues from uninfested fruits. To further tease apart the role of (i) suitable and non-suitable maggots, (ii) infested and uninfested fruits of different plant species, and (iii) adult flies, in wasp host location and selection, I carried out a series of behavioural tests where I manipulated these attributes in a field cage. These trials confirmed that D. kraussii did not respond to cues in uninfested fruits, that there were consistent preferences by the wasps for different maggot infested fruits, that fruit preference did not vary depending on whether the maggots were physiologically suitable or not suitable for wasp offspring development, and finally, that adult flies appear to play a secondary role as indicators of larval infestation. To investigate wasp behaviour in an unrestrained environment, I concurrently observed diurnal foraging behaviours of both the wasp and one of its host fly in a small nectarine orchard. Wasp behaviour, both spatially and temporally, was not correlated with adult fruit fly behaviour or abundance. This study reinforced the point that infested fruit seems to be the primary cue used by foraging wasps. Wasp and fly feeding and mating was not observed in the orchard, implying these activities are occurring elsewhere. It is highly unlikely that these behaviours were happening within the orchard during the night as both insects are diurnal. As the final component of investigating host location, I carried out a habitat preference study for the wasp at the landscape scale. Using infested sentinel fruits, I tested the parasitism rate of B. tryoni in eucalyptus sclerophyll forest, rainforest and suburbia in South East Queensland. Although, rainforest is the likely endemic habitat of both B. tryoni and D. kraussii, B. tryoni abundance is significantly greater in suburban environments followed by eucalyptus sclerophyll forest. Parasitism rate was found to be higher in suburbia than in the eucalyptus sclerophyll forest, while no parasitism was recorded in the rainforest. This result suggests that wasps orient within the landscape towards areas of high host density and are not restricted by habitat types. Results from the different experiments suggest that host searching, selection and utilisation behaviour of D. kraussii are strongly influenced by cues associated with fruit fly larval feeding. Cues from uninfested fruits, the host larvae themselves, and the adult host flies play minimal roles. The discussion focuses on the fit of D. kraussii to Vinson’s classical parasitoid host location model and the implications of results for biological control, including recommendations for host and plant preference screening protocols and release regimes.