904 resultados para Identity-based encryption
Resumo:
A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which acts as a pseudo-random generator (PRNG). The paper main focus is to use chaos theory to cryptography. Thus, CA was explored to look for this "chaos" property. This way, the manuscript is more concerning on tests like: Lyapunov exponent, Entropy and Hamming distance to measure the chaos in CA, as well as statistic analysis like DIEHARD and ENT suites. Our results achieved higher randomness quality than others ciphers in literature. These results reinforce the supposition of a strong relationship between chaos and the randomness quality. Thus, the "chaos" property of CA is a good reason to be employed in cryptography, furthermore, for its simplicity, low cost of implementation and respectable encryption power. (C) 2012 Elsevier Ltd. All rights reserved.
Resumo:
LLas nuevas tecnologías orientadas a la nube, el internet de las cosas o las tendencias "as a service" se basan en el almacenamiento y procesamiento de datos en servidores remotos. Para garantizar la seguridad en la comunicación de dichos datos al servidor remoto, y en el manejo de los mismos en dicho servidor, se hace uso de diferentes esquemas criptográficos. Tradicionalmente, dichos sistemas criptográficos se centran en encriptar los datos mientras no sea necesario procesarlos (es decir, durante la comunicación y almacenamiento de los mismos). Sin embargo, una vez es necesario procesar dichos datos encriptados (en el servidor remoto), es necesario desencriptarlos, momento en el cual un intruso en dicho servidor podría a acceder a datos sensibles de usuarios del mismo. Es más, este enfoque tradicional necesita que el servidor sea capaz de desencriptar dichos datos, teniendo que confiar en la integridad de dicho servidor de no comprometer los datos. Como posible solución a estos problemas, surgen los esquemas de encriptación homomórficos completos. Un esquema homomórfico completo no requiere desencriptar los datos para operar con ellos, sino que es capaz de realizar las operaciones sobre los datos encriptados, manteniendo un homomorfismo entre el mensaje cifrado y el mensaje plano. De esta manera, cualquier intruso en el sistema no podría robar más que textos cifrados, siendo imposible un robo de los datos sensibles sin un robo de las claves de cifrado. Sin embargo, los esquemas de encriptación homomórfica son, actualmente, drás-ticamente lentos comparados con otros esquemas de encriptación clásicos. Una op¬eración en el anillo del texto plano puede conllevar numerosas operaciones en el anillo del texto encriptado. Por esta razón, están surgiendo distintos planteamientos sobre como acelerar estos esquemas para un uso práctico. Una de las propuestas para acelerar los esquemas homomórficos consiste en el uso de High-Performance Computing (HPC) usando FPGAs (Field Programmable Gate Arrays). Una FPGA es un dispositivo semiconductor que contiene bloques de lógica cuya interconexión y funcionalidad puede ser reprogramada. Al compilar para FPGAs, se genera un circuito hardware específico para el algorithmo proporcionado, en lugar de hacer uso de instrucciones en una máquina universal, lo que supone una gran ventaja con respecto a CPUs. Las FPGAs tienen, por tanto, claras difrencias con respecto a CPUs: -Arquitectura en pipeline: permite la obtención de outputs sucesivos en tiempo constante -Posibilidad de tener multiples pipes para computación concurrente/paralela. Así, en este proyecto: -Se realizan diferentes implementaciones de esquemas homomórficos en sistemas basados en FPGAs. -Se analizan y estudian las ventajas y desventajas de los esquemas criptográficos en sistemas basados en FPGAs, comparando con proyectos relacionados. -Se comparan las implementaciones con trabajos relacionados New cloud-based technologies, the internet of things or "as a service" trends are based in data storage and processing in a remote server. In order to guarantee a secure communication and handling of data, cryptographic schemes are used. Tradi¬tionally, these cryptographic schemes focus on guaranteeing the security of data while storing and transferring it, not while operating with it. Therefore, once the server has to operate with that encrypted data, it first decrypts it, exposing unencrypted data to intruders in the server. Moreover, the whole traditional scheme is based on the assumption the server is reliable, giving it enough credentials to decipher data to process it. As a possible solution for this issues, fully homomorphic encryption(FHE) schemes is introduced. A fully homomorphic scheme does not require data decryption to operate, but rather operates over the cyphertext ring, keeping an homomorphism between the cyphertext ring and the plaintext ring. As a result, an outsider could only obtain encrypted data, making it impossible to retrieve the actual sensitive data without its associated cypher keys. However, using homomorphic encryption(HE) schemes impacts performance dras-tically, slowing it down. One operation in the plaintext space can lead to several operations in the cyphertext space. Because of this, different approaches address the problem of speeding up these schemes in order to become practical. One of these approaches consists in the use of High-Performance Computing (HPC) using FPGAs (Field Programmable Gate Array). An FPGA is an integrated circuit designed to be configured by a customer or a designer after manufacturing - hence "field-programmable". Compiling into FPGA means generating a circuit (hardware) specific for that algorithm, instead of having an universal machine and generating a set of machine instructions. FPGAs have, thus, clear differences compared to CPUs: - Pipeline architecture, which allows obtaining successive outputs in constant time. -Possibility of having multiple pipes for concurrent/parallel computation. Thereby, In this project: -We present different implementations of FHE schemes in FPGA-based systems. -We analyse and study advantages and drawbacks of the implemented FHE schemes, compared to related work.
Resumo:
This dissertation reports an investigation of the utility of two intervention programs to facilitate identity formation by way of exploration, one designed from an explicitly self-construction point of view and the other designed from an explicitly self-discovery point of view. The self-construction program was implemented using cognitive skills and orientations derived from Berzonsky (1989), Grotevant (1987), and Kurtines (1999). The self-discovery program was implemented using affective insight development strategies derived from Csikszentmihalyi (1990), Maslow (1968), and Waterman (1990). Three sets of measures were used: (a) cognitive identity measures, (b) affective identity measures, and (c) overall identity measures. Ninety undergraduates from Florida International University completed the intervention. Participants were assigned to one of three intervention conditions (Cognitive, Affective, and Control) and were pretested and posttested on cognitive, affective, and overall identity measures. Intervention strategies were introduced and discussed in the context of specific goals and choices that participants brought to group. Intervention results were then analyzed in terms of the effectiveness of the intervention conditions in promoting their respective developmental domains. The intervention was effective in promoting identity development in comparison to the control condition, with the cognitive condition facilitating cognitive competence and the affective condition facilitating affective insight. Results are discussed in the context of the constructivist and discovery perspectives, as well as in light of the broadened view of exploration offered in this paper. ^
Resumo:
Adolescence is a pivotal period offering both opportunities and constraints on individual development. It is during this important time that one decides upon and commits to the values, goals, and beliefs which will form one's identity and guide one throughout the lifespan. Positive youth development programs, such as the Miami Youth Development Project's Changing Lives Program, target the formation of a positive sense of identity as a critical intervention point. Through developing a coherent and positive sense of self, adolescents take control of and responsibility for their lives and their decisions. Furthermore, a positive identity has been found to be a developmental asset and is linked to lower risk behaviors and positive outcomes including increased self-esteem, sense of purpose, and a positive view of the future. Positive youth development programs, which promote positive identity development, have been found to be more strongly tied to positive outcomes including skills, values, and competencies than have contextual opportunities. As such, it is critical to determine what leads to positive identity development. ^ The current study used structural equation modeling to evaluate three potential mediators of identity development. Findings indicated good model fit where change in identity commitment and change in identity exploration were mediated by informational identity style, personal expressiveness, and identity distress. There were also significant differences found between the control and intervention groups indicative of intervention effects. The findings of the current study suggest potential areas of intervention as well as the need for further research including longitudinal study and the use of qualitative methodology. ^
Resumo:
The complete SSU rDNA was sequenced for 10 individuals of Cladophora vagabunda collected along the coast of Brazil. For C. rupestris (L.) Kütz. a partial SSU rDNA sequence (1634 bp) was obtained. Phylogenetic trees indicate that Cladophora is paraphyletic, but the section Glomeratae sensu lato including C. vagabunda from Brazil, Japan and France, C. albida (Nees) Kütz., C. sericea (Hudson) Kütz., and C. glomerata (L.) Kütz. is monophyletic. Within this group C. vagabunda is paraphyletic. The sequence identity for the SSU rDNA varied from 98.9% to 100% for the Brazilian C. vagabunda, and from 98.3% to 99.7% comparing the Brazilian individuals to the ones from France and Japan. Sequence identity of the Brazilian C. vagabunda to C. albida and C. sericea vary from 98.0% to 98.6%. The SSU rDNA phylogeny support partially the morphological characteristics presented by Brazilian populations of C. vagabunda. On the other hand, C. rupestris from Brazil does not group with C. rupestris from France, both sequences presenting only 96.9% of identity. The inclusion of sequences of individuals from Brazil reinforces the need of taxonomical revision for the genus Cladophora and for the complex C. vagabunda.
Resumo:
The objective of this investigation was to examine in a systematic manner the influence of plasma protein binding on in vivo pharmacodynamics. Comparative pharmacokinetic-pharmacodynamic studies with four beta blockers were performed in conscious rats, using heart rate under isoprenaline-induced tachycardia as a pharmacodynamic endpoint. A recently proposed mechanism-based agonist-antagonist interaction model was used to obtain in vivo estimates of receptor affinities (K(B),(vivo)). These values were compared with in vitro affinities (K(B),(vitro)) on the basis of both total and free drug concentrations. For the total drug concentrations, the K(B),(vivo) estimates were 26, 13, 6.5 and 0.89 nM for S(-)-atenolol, S(-)-propranolol, S(-)-metoprolol and timolol. The K(B),(vivo) estimates on the basis of the free concentrations were 25, 2.0, 5.2 and 0.56 nM, respectively. The K(B),(vivo)-K(B),(vitro) correlation for total drug concentrations clearly deviated from the line of identity, especially for the most highly bound drug S(-)-propranolol (ratio K(B),(vivo)/K(B),(vitro) similar to 6.8). For the free drug, the correlation approximated the line of identity. Using this model, for beta-blockers the free plasma concentration appears to be the best predictor of in vivo pharmacodynamics. (C) 2008 Wiley-Liss, Inc. and the American Pharmacists Association J Pharm Sci 98:3816-3828, 2009
Resumo:
Two experiments examined the effects of interpersonal and group-based similarity on perceived self-other differences in persuasibility (i.e. on third-person effects, Davison, 1983). Results of Experiment 1 (N=121), based on experimentally-created groups, indicated that third-person perceptions with respect to the impact of televised product ads were accentuated when the comparison was made with interpersonally different others. Contrary to predictions, third-person perceptions were not affected by group-based similarity (i.e. ingroup or outgroup other). Results of Experiment 2 (N = 102), based an an enduring social identity, indicated that both interpersonal and group-based similarity moderated perceptions of the impact on self and other of least-liked product ads. Overall, third-person effects were more pronounced with respect to interpersonally dissimilar others. However, when social identity was salient, information about interpersonal similarity of the target did not affect perceived self-other differences with respect to ingroup targets. Results also highlighted significant differences in third-person perceptions according to the perceiver's affective evaluation of the persuasive message. (C) 1998 John Wiley & Sons, Ltd.
Resumo:
Although aspects of social identity theory are familiar to organizational psychologists, its elaboration, through self-categorization theory, of how social categorization and prototype-based depersonalization actually produce social identity effects is less well known. We describe these processes, relate self-categorization theory to social identity theory, describe new theoretical developments in detail, and show how these developments can address a: range of organizational phenomena. We discuss cohesion and deviance, leadership, subgroup and sociodemographic structure, and mergers and acquisitions.
Resumo:
This chapter begins with a definition of terrorism and a brief review of some of the more traditional applications of social psychology theory. The authors then outline a broadly based theory of the self and explore the implications of the theory for the recruitment of terrorists. The final section examines some of the important social norms that facilitate and regulate the behavior of terrorists. (PsycINFO Database Record (c) 2008 APA, all rights reserved)
Resumo:
293T and Sk-Hep-1 cells were transduced with a replication-defective self-inactivating HIV-1 derived vector carrying FVIII cDNA. The genomic DNA was sequenced to reveal LTR/human genome junctions and integration sites. One hundred and thirty-two sequences matched human sequences, with an identity of at least 98%. The integration sites in 293T-FVIIIDB and in Sk-Hep-FVIIIDB cells were preferentially located in gene regions. The integrations in both cell lines were distant from the CpG islands and from the transcription start sites. A comparison between the two cell lines showed that the lentiviral-transduced DNA had the same preferred regions in the two different cell lines.
Resumo:
A social identity theory of leadership is described that views leadership as a group process generated by social categorization and prototype-based depersonalization processes associated with social identity. Group identification, as self-categorization, constructs an intragroup prototypicality gradient that invests the most prototypical member with the appearance of having influence; the appearance arises because members cognitively and behaviorally conform to the prototype. The appearance of influence becomes a reality through depersonalized social attraction processes that make followers agree and comply with the leader's ideas and suggestions. Consensual social attraction also imbues the leader with apparent status and creates a status-based structural differentiation within the group into leader(s) and followers, which has characteristics of unequal status intergroup relations. In addition, a fundamental attribution process constructs a charismatic leadership personality for the leader, which further empowers the leader and sharpens the leader-follower status differential. Empirical support for the theory is reviewed and a range of implications discussed, including intergroup dimensions, uncertainty reduction and extremism, power, and pitfalls of prototype-based leadership.
Resumo:
This study examines whether dissimilarity among employees that is based on their work status (i.e., whether they are temporary or internal workers) influences their organization-based self-esteem, their trust in and attraction toward their peers, and their altruism. A model that is based on social identity theory posits that work-status dissimilarity negatively influences each outcome variable and that the strength of this relationship varies depending on whether employees have temporary or internal status and the composition of their work groups. Results that are based on a survey of 326 employees (189 internal and 137 temporary) from 34 work groups, belonging to 2 organizations, indicate that work-status dissimilarity has a systematic negative effect only on outcomes related to internal workers when they work in temporary-worker-dominated groups.
Resumo:
Sequences from the tuf gene coding for the elongation factor EF-Tu were amplified and sequenced from the genomic DNA of Pirellula marina and Isosphaera pallida, two species of bacteria within the order Planctomycetales. A near-complete (1140-bp) sequence was obtained from Pi. marina and a partial (759-bp) sequence was obtained for I. pallida. Alignment of the deduced Pi. marina EF-Tu amino acid sequence against reference sequences demonstrated the presence of a unique Il-amino acid sequence motif not present in any other division of the domain Bacteria. Pi. marina shared the highest percentage amino acid sequence identity with I. pallida but showed only a low percentage identity with other members of the domain Bacteria. This is consistent with the concept of the planctomycetes as a unique division of the Bacteria. Neither primary sequence comparison of EF-Tu nor phylogenetic analysis supports any close relationship between planctomycetes and the chlamydiae, which has previously been postulated on the basis of 16S rRNA. Phylogenetic analysis of aligned EF-Tu amino acid sequences performed using distance, maximum-parsimony, and maximum likelihood approaches yielded contradictory results with respect to the position of planctomycetes relative to other bacteria, It is hypothesized that long-branch attraction effects due to unequal evolutionary rates and mutational saturation effects may account for some of the contradictions.
Resumo:
Sorghum ergot was first discovered in Australia in 1996. It affects seed production and grain usage in stock feed due to concerns of animal toxicity. Three species of Claviceps are known to cause ergot of sorghum with different epidemiological, animal toxicity, and management implications. Claviceps africana was identified as the causal agent but morphological differences between isolates raised the possibility of more than one species being involved. The major aim of this study was to identify the Claviceps species causing sorghum ergot and to determine the genetic diversity among isolates of the ergot pathogen from Australia and overseas. Symptom development, sequencing of the ITS1 region, and radiolabelled DNA amplification fingerprints (RAF) were used to confirm that ergot of sorghum in Australia is caused by C. africana. The morphology of sphacelia, microconidia, macroconidia, and secondary conidia of all 36 Australian isolates studied matched the description for C. africana and the DNA sequence of the ITS1 region of 2 selected Australian isolates was identical to that of C. africana. Based on RAF analysis of 110 Australian and overseas isolates of Claviceps spp., C. africana isolates could be clearly distinguished (