994 resultados para Analects of confucius
Resumo:
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.
Resumo:
Employer non-compliance with workers’ entitlements is an area seldom explored in Australian industrial relations, generally considered uncommon or the province of ‘rogue’ employers. This paper provides a picture of the categories of entitlements against which complaints of evasion were made in the federal industrial relations jurisdiction in Australia, between 1986 and 1995 and the characteristics of complainants. The “top 30” awards ranked by extent of underpayment recovered by the federal enforcement agency (1987-95) are also explored to support arguments that intense competition, reduced union density, precarious employment, youth and being female are strongly associated with employer evasion. The increasing prevalence of these factors in the labour market suggests that employer compliance should be more carefully explored in the Australian context.