964 resultados para Secure Authentication for Broadcast (DNP3-SAB)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Twitter is a social media service that has managed very successfully to embed itself deeply in the everyday lives of its users. Its short message length (140 characters), and one-way connections (‘following’ rather than ‘friending’) lend themselves effectively to random and regular updates on almost any form of personal or professional activity – and it has found uses from the interpersonal (e.g. boyd et al., 2010) through crisis communication (e.g. Bruns et al., 2012) to political debate (e.g. Burgess & Bruns, 2012). In such uses, Twitter does not necessarily replace existing media channels, such as the broadcast or online offerings of the mainstream media, but often complements them, providing its users with alternative opportunities to contribute more actively to the wider mediasphere. This is true especially where Twitter is used alongside television, as a simple backchannel to live programming or for more sophisticated uses. In this article, we outline four aspects – dimensions – of the way that the ‘old’ medium of television intersects and, in some cases, interacts, with the ‘new’ medium of Twitter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a growing number of nations embark on a path to democracy, criminologists have become increasingly interested and engaged in the challenges, concerns, and questions connecting democracy with both crime and criminal justice. Rising levels of violence and street crime, white collar crime and corruption both in countries where democracy is securely in place and where it is struggling, have fuelled a deepening skepticism as to the capacity of democracy to deliver on its promise of security and justice for all citizens. What role does crime and criminal justice play in the future of democracy and for democratic political development on a global level? The editors of this special volume of The Annals realized the importance of collecting research from a broad spectrum of countries and covering a range of problems that affect citizens, politicians, and criminal justice officials. The articles here represent a solid balance between mature democracies like the U.S. and U.K. as well as emerging democracies around the globe – specifically in Latin America, Africa and Eastern Europe. They are based on large and small cross-national samples, regional comparisons, and case studies. Each contribution addresses a seminal question for the future of democratic political development across the globe. What is the role of criminal justice in the process of building democracy and instilling confidence in its institutions? Is there a role for unions in democratizing police forces? What is the impact of widespread disenfranchisement of felons on democratic citizenship and the life of democratic institutions? Under what circumstances do mature democracies adopt punitive sentencing regimes? Addressing sensitive topics such as relations between police and the Muslim communities of Western Europe in the wake of terrorist attacks, this volume also sheds light on the effects of terrorism on mature democracies under increasing pressure to provide security for their citizens. By taking a broad vantage point, this collection of research delves into complex topics such as the relationship between the process of democratization and violent crime waves; the impact of rising crime rates on newly established as well as secure democracies; how crime may endanger the transition to democracy; and how existing practices of criminal justice in mature democracies affect their core values and institutions. The collection of these insightful articles not only begins to fill a gap in criminological research but also addresses issues of critical interest to political scientists as well as other social and behavioral scientists and scholars. Taking a fresh approach to the intersection of crime, criminal justice, and democracy, this volume of The Annals is a must-read for criminologists and political scientists and provides a solid foundation for further interdisciplinary research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite its efficacy and cost-effectiveness, exercise-based cardiac rehabilitation is undertaken by less than one-third of clinically eligible cardiac patients in every country for which data is available. Reasons for non-participation include the unavailability of hospital-based rehabilitation programs, or excessive travel time and distance. For this reason, there have been calls for the development of more flexible alternatives. Methodology and Principal Findings We developed a system to enable walking-based cardiac rehabilitation in which the patient's single-lead ECG, heart rate, GPS-based speed and location are transmitted by a programmed smartphone to a secure server for real-time monitoring by a qualified exercise scientist. The feasibility of this approach was evaluated in 134 remotely-monitored exercise assessment and exercise sessions in cardiac patients unable to undertake hospital-based rehabilitation. Completion rates, rates of technical problems, detection of ECG changes, pre- and post-intervention six minute walk test (6 MWT), cardiac depression and Quality of Life (QOL) were key measures. The system was rated as easy and quick to use. It allowed participants to complete six weeks of exercise-based rehabilitation near their homes, worksites, or when travelling. The majority of sessions were completed without any technical problems, although periodic signal loss in areas of poor coverage was an occasional limitation. Several exercise and post-exercise ECG changes were detected. Participants showed improvements comparable to those reported for hospital-based programs, walking significantly further on the post-intervention 6 MWT, 637 m (95% CI: 565–726), than on the pre-test, 524 m (95% CI: 420–655), and reporting significantly reduced levels of cardiac depression and significantly improved physical health-related QOL. Conclusions and Significance The system provided a feasible and very flexible alternative form of supervised cardiac rehabilitation for those unable to access hospital-based programs, with the potential to address a well-recognised deficiency in health care provision in many countries. Future research should assess its longer-term efficacy, cost-effectiveness and safety in larger samples representing the spectrum of cardiac morbidity and severity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A substantial group of young people experience mental health problems which impact on their educational development and subsequent wellbeing. Of those who do suffer from mental health issues, a minority of these seek appropriate professional assistance. This paucity of help seeking behaviours among young people is a challenge for counsellors. Whereas adults who suffer mental health issues have increasingly turned to the internet for assistance, it is interesting that when young people whose social lives are increasingly dependent on the communication technologies, are not catered for as much as adults by online counselling. One small online counselling pilot program conducted at a Queensland secondary school for three years from 2005-2007 (Glasheen & Campbell, 2009) offered anonymous live-time counselling from the school counsellor (via a secure chat room) to students through the school’s website. Findings indicated that boys were more likely to use the service than girls. All participants transitioned to face-to-face counselling, and all reported it was beneficial. This pilot study attested to the potential of an online counselling. However, school counsellors as a professional group have been hesitant to utilise online counselling as part of their service delivery to young people in schools. This chapter concludes by identifying reasons for this reluctance and the possible initiatives to increase online support for young people in schools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The birth of a baby is a significant event for women and their families, with the event being influenced by the prevailing social and cultural context. Historically, women throughout the world have given birth at home assisted by other women who helped them cope with the stress of labour and birth. In the middle of the twentieth century, the togetherness, caring and support that were provided within the social and cultural context of childbirth began to change; women in most developed countries, and to some extent in developing countries, laboured and gave birth in institutions that isolated them from the support of family and friends. This practice is referred to as the medical model of childbirth and, over time, birthing within this model has come to be viewed by women as a dehumanising experience. In an attempt to secure a more supportive experience, women began to demand the presence of a supportive companion; namely their partner. This event became the catalyst for a number of studies focusing on different types of support providers and their contribution to the phenomenon of social support during labour. More recently, it has become a common practice for some women to be supported during labour by a number of people from their social network. However, research on the influence of such supportive people on women’s experience of labour and birth and on birth outcomes is scarce. The aim of this study is to examine the influence of various support arrangements from a woman’s family and social network on her experience of labour and birth and on birth outcomes. The mixed-method study was conducted to answer three research questions: 1. Do women with more than one support person present during labour and birth have similar perceptions and experiences of support compared to women with one support person? 2. Do women with more than one support person present during labour and birth have similar birth outcomes compared to women with one support person? 3. Do women with different types of support providers during labour and birth have similar birth outcomes? Methods Phase one of this study developed, pilot tested and administered a newly developed instrument designed to measure women’s perceptions of supportive behaviours provided during labour. Specific birth outcome data were extracted from the medical records. Phase two consisted of in-depth interviews with a sample of women who had completed the survey. Results: The results identified a statistically significant relationship between women’s perceptions of social support and the number of support providers: women supported by one person only rated the supportive behaviours of that person more highly compared to women who were supported by a number of people. The results also identified that women supported by one person used less analgesia. An additional qualitative finding was that some women sacrificed the support of female relatives at the request of their partners. Conclusion: By using a mixed-method approach, this study found that women were selective in their choice of support providers, as they chose individuals with whom they had an enduring affectionate attachment. Women place more emphasis on a support person’s ability to fulfil their attachment needs of close proximity and a sense of security and safety, rather than their ability to provide the expected functional supportive behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate existing cloud storage schemes and identify limitations in each one based on the security services that they provide. We then propose a new cloud storage architecture that extends CloudProof of Popa et al. to provide availability assurance. This is accomplished by incorporating a proof of storage protocol. As a result, we obtain the first secure storage cloud computing scheme that furnishes all three properties of availability, fairness and freshness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to the regulations and laws that require data and operations to reside in specific geographic locations. Thus, data owners may need to ensure that their cloud providers do not compromise the SLA contract and move their data into another geographic location. This paper introduces an architecture for a new approach for geographic location assurance, which combines the proof of storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. This architecture aims to achieve better security and more flexible geographic assurance within the environment of cloud computing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-state insurgent actors are too weak to compel powerful adversaries to their will, so they use violence to coerce. A principal objective is to grow and sustain violent resistance to the point that it either militarily challenges the state, or more commonly, generates unacceptable political costs. To survive, insurgents must shift popular support away from the state and to grow they must secure it. State actor policies and actions perceived as illegitimate and oppressive by the insurgent constituency can generate these shifts. A promising insurgent strategy is to attack states in ways that lead angry publics and leaders to discount the historically established risks and take flawed but popular decisions to use repressive measures. Such decisions may be enabled by a visceral belief in the power of coercion and selective use of examples of where robust measures have indeed suppressed resistance. To avoid such counterproductive behaviours the cases of apparent 'successful repression' must be understood. This thesis tests whether robust state action is correlated with reduced support for insurgents, analyses the causal mechanisms of such shifts and examines whether such reduction is because of compulsion or coercion? The approach is founded on prior research by the RAND Corporation which analysed the 30 insurgencies most recently resolved worldwide to determine factors of counterinsurgent success. This new study first re-analyses their data at a finer resolution with new queries that investigate the relationship between repression and insurgent active support. Having determined that, in general, repression does not correlate with decreased insurgent support, this study then analyses two cases in which the data suggests repression seems likely to be reducing insurgent support: the PKK in Turkey and the insurgency against the Vietnamese-sponsored regime after their ousting of the Khmer Rouge. It applies 'structured-focused' case analysis with questions partly built from the insurgency model of Leites and Wolf, who are associated with the advocacy of US robust means in Vietnam. This is thus a test of 'most difficult' cases using a 'least likely' test model. Nevertheless, the findings refute the deterrence argument of 'iron fist' advocates. Robust approaches may physically prevent effective support of insurgents but they do not coercively deter people from being willing to actively support the insurgency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: It is imperative to understand how to engage young women in research about issues that are important to them. There is limited reliable data on how young women access contraception in Australia especially in rural areas where services may be less available. Objective: This paper identifies the challenges involved in engaging young Australian women aged 18-23 years to participate in a web-based survey on contraception and pregnancy and ensure their ongoing commitment to follow-up web-based surveys. Methods: A group of young women, aged 18-23 years and living in urban and rural New South Wales, Australia, were recruited to participate in face-to-face discussions using several methods of recruitment: direct contact (face-to-face, telephone or email)and snowball sampling by potential participants inviting their friends. All discussions were transcribed verbatim and analyzed using thematic analysis. Results: Twenty young women participated (urban, n=10: mean age 21.6 years; rural, n=10: 20.0 years) and all used computers or smart phones to access the internet on a daily basis. All participants were concerned about the cost of internet access and utilized free access to social media on their mobile phones. Their willingness to participate in a web-based survey was dependent on incentives with a preference for small financial rewards. Most participants were concerned about their personal details and survey responses remaining confidential and secure. The most appropriate survey would take up to 15 minutes to complete, be a mix of short and long questions and eye-catching with bright colours. Questions on the sensitive topics of sexual activity, contraception and pregnancy were acceptable if they could respond with “I prefer not to answer”. Conclusions: There are demographic, participation and survey design challenges in engaging young women in a web-based survey. Based on our findings, future research efforts are needed to understand the full extent of the role social media and incentives play in the decision of young women to participate in web-based research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last ten years, approximately one third of refugee and humanitarian entrants to Australia have been adult men. To date, little research has been done on their health and settlement issues. Many of these men have come from the African continent. This paper reports on the educational and employment outcomes of a group of 173 recently arrived adult African men from refugee backgrounds who have settled in Southeast Queensland. Given the current government policy focus on regional resettlement, the paper compares key outcomes between the adult African men who settled in metropolitan Brisbane with those living in the Toowoomba-Gatton region. The study uses a peer interviewer model and a mixed method approach. Overall, we have found that African men who have settled in regional areas face significantly greater educational and occupational challenges than those who settled in the urban area. They report more negative experiences at educational institutions, are more likely to take jobs that are below their level of skills and qualifications, are more dissatisfied with their jobs, and report greater discrimination and difficulties while trying to secure adequate employment in Australia. A number of policy implications are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Food insecurity is the limited/uncertain availability, access to or ability to acquire nutritionally-adequate, culturallyrelevant and safe foods. Adults suffering from food insecurity are at risk of inadequate nutrient intakes or, paradoxically, overweight/ obesity and the development of chronic disease. Despite the global financial crisis and rising costs of living, there are few studies investigating the potential dietary consequences of food insecurity among the Australian population. This study examined whether food insecurity was associated with weight status and poorer intakes of fruits, vegetable and takeaway foods among adults residing in socioeconomically-disadvantaged urbanised areas. Methods: In this cross-sectional study, a random sample of residents (n=1000) were selected from the most disadvantaged suburbs of Brisbane city (response rate 51%). Data were collected by postal questionnaire which ascertained information on sociodemographic information, household food security status, height, weight, fruit and vegetable intakes and takeaway consumption. Data were analysed using chi-square and logistic regression. Results: The overall prevalence of food insecurity was 31%. Food insecurity was not associated with weight status among men or women. Associations between food security status and potential dietary consequences differed for men and women. Among women, food security was not associated with intakes of fruit, vegetable or takeaway consumption. Contrastingly, among men food security was associated with vegetable intakes and consumption of takeaway food: men reporting food insecurity had lower intakes of vegetables and were more likely to consume takeaway foods compared to those that were food secure. Conclusion: Food security is an important public health issue in Australia and has potential dietary consequences that may adversely affect the health of food-insecure groups, most notably men residing in food-insecure households.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last five years we have observed the fallout from the global financial crisis (GFC). International cooperation and jointly adopted policies have dominated many of the solutions to the problems which have arisen. Initially, many nations in response to the GFC, implemented a two pronged short term solution by undertaking fiscal intervention and delivering rescue packages aimed at first, bailing out financial institutions and second, preventing or minimising the impact of a recession. Both programs involved large amounts of domestic spending. It was difficult in early 2007 to foresee the reduction that nations were about the face in domestic revenue collected. Five years on, not only have the first line effects of the GFC reduced the revenue raised by governments around the world, but the consequential costs associated with the rescue packages have also depleted domestic revenue bases. The response by stakeholders has been to attempt to secure domestic revenue bases through fiscally sustainable measures. Domestic sovereignty allows the levying of taxes as a nation chooses. However, rather than raise domestic taxes, revenue may also be increased by stemming the flow of income and capital to low and no-tax jurisdictions. The intervening five-year period since the GFC allows a unique insight into the response by nations and international organisations to tax evasion, tax avoidance and aggressive tax competition through the cross border flows of capital and the resulting affect that the GFC has had on international tax cooperation. By investigating the change in the international tax landscape over the last five years, which reveals the work done by stakeholders in developing fiscally responsible responses to the problems that have arisen, it may be possible to predict the trajectory of the international tax landscape over the next five years.