998 resultados para Private fleet


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

User-generated content plays a pivotal role in the current social media. The main focus, however, has been on the explicitly generated user content such as photos, videos and status updates on different social networking sites. In this paper, we explore the potential of implicitly generated user content, based on users’ online consumption behaviors. It is technically feasible to record users’ consumption behaviors on mobile devices and share that with relevant people. Mobile devices with such capabilities could enrich social interactions around the consumed content, but it may also threaten users’ privacy. To understand the potentials of this design direction we created and evaluated a low-fidelity prototype intended for photo sharing within private groups. Our prototype incorporates two design concepts, namely, FingerPrint and MoodPhotos that leverage users’ consumption history and emotional responses. In this paper, we report user values and user acceptance of this prototype from three participatory design workshops.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In private placement transactions, issuing firms sell a block of securities to just a small group of investors at a discounted price. Non-participating shareholders suffer from ownership dilution and lose the opportunity to receive the discount. This thesis provides the first evidence on whether and how corporate governance can protect non-participating shareholders' interests. Results from an examination of 329 private placements issued by the top 250 Australian firms between 2002 and 2009 demonstrate that firms with higher governance quality are more likely to issue a share purchase plan (SPP) along with the private placement, thus providing greater protection to non-participating shareholders' interests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based PIR protocols require heavy periodical preprocessing. In this paper, we propose a new protocol, which is free from the periodical preprocessing while offering the optimal communication complexity and almost optimal online processing complexity. The proposed protocol is proven to be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since Queensland Wire Industries Pty Ltd v Broken Hill Pty Co Ltd (1989) 167 CLR 177 it has been recognised that corporations with substantial market power are subject to special responsibilities and restraints that corporations without market power are not. In NT Power Generation Pty Ltd v Power and Water Authority (2004) 219 CLR 90 McHugh A-CJ, Gummow, Callinan and Heydon JJ in their joint reasons stated (at [76]), that s 46 of the Competition and Consumer Act 2010 (Cth) (CCA) can operate not only to prevent firms with substantial market power from doing prohibited things, but also compel them positively to do things they do not want to do. Their Honours also stated (at [126]) that the proposition that a private property owner who declines to permit competitors to use the property is immune from s 46 is “intrinsically unsound”. However, the circumstances in which a firm with substantial power must accommodate competitors, and private property rights give way to the public interest are uncertain. The purpose of this Note is to consider recent developments in two areas of the CCA where the law requires private property rights to give way to the public interest. The first part of the Note considers two recent cases which clarify the circumstances in which s 46 of the CCA can be used to compel a firm with substantial market power to accommodate a competitor and allow the competitor to make use of private property rights in the public interest. Secondly, on 12 February 2014 the Minister for Small Business, the Hon Bruce Billson,released the Productivity Commission’s Final Report, on the National Access Regime in Pt IIIA of the CCA (National Access Regime, Inquiry Report No 66, Canberra). Pt IIIA provides for the processes by which third parties may obtain access to infrastructure owned by others in the public interest. The Report recommends that Pt IIIA be retained but makes a number of suggestions for its reform, some of which will be briefly considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Taxation Office (AT)) attempted to challenge both the private equity fund reliance on double tax agreements and the assertion that profits were capital in nature in its dispute with private equity group TPG. Failure to resolve the dispute resulted in the ATO issuing two taxation determinations: TD 2010/20 which states that the general anti-avoidance provisions can apply to arrangements designed to alter the intended effect of Australia's international tax agreements net; and TD 2010/21 which states that the profits on the sale of shares in a company group acquired in a leveraged buyout is assessable income. The purpose of this article is to determine the effectiveness of the administrative rulings regime as a regulatory strategy. This article, by using the TPG-Myer scenario and subsequent tax determinations as a case study, collects qualitative data which is then analysed (and triangulated) using tonal and thematic analysis. Contemporaneous commentary of private equity stakeholders, tax professionals, and media observations are analysed and evaluated within a framework of responsive regulation and utilising the current ATO compliance model. Contrary to the stated purpose of the ATO rulings regime to alleviate complexities in Australian taxation law and provide certainty to taxpayers, and despite the de facto law status afforded these rulings, this study found that the majority of private equity stakeholders and their advisors perceived that greater uncertainty was created by the two determinations. Thus, this study found that in the context of private equity fund investors, a responsive regulation measure in the form of taxation determinations was not effective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A procurement decision-making model is developed based on a novel integration of leading-edge microeconomic theory and empirically tested in major road and health projects. The model provides a more reliable approach to identifying projects suited to Public-Private-Partnerships (PPPs) and it is expected that the model will enable government to deliver improved value-for-money from their portfolio of PPP projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private Ancillary Funds (PAFs) are trusts to which Australian taxpayers can make tax deductible donations, enabling families, businesses and individuals to create a tax effective closely held charitable trust, whose sole purpose must be to provide money, property or benefits to deductible gift recipients. This Current Issues Information Sheet charts the movement in approval of PAFs, donations made to and distributions made by PAFs during the period 2000-01 to 2011-12.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Pharmacists are considered medication experts but are underutilised mainly at the periphery of the primary healthcare team. General medical practitioners (GPs) in Malaysian private healthcare clinics are granted rights to prescribe and dispense medications, thus furhter limiting pharmacists involvement in ensuring safe use of medicines. The integration of pharmacist into private primary healthcare clinics has the potential to reduce medication-relation problems. Objective: To explore the views of consumers on the integration of pharmacists within private primary healthcare clinics in Malaysia. Method: A purposive sample of healthcare consumers in Selangor and Kuala Lumpur, Malaysia were invited to participate in focus groups and semi-structured interviews. Sessions were audio recorded and transcribed verbatim and thematically analysed using NVivo 10. Results: A total of 24 healthcare consumers particpated in two focus groups and six semi-structured interviews. Four major themes were identified: (1) Pharmacists role viewed mainly as supplying medications, (2) Readiness to accept pharmacists in private healthcare clinics, (3) Willingness to pay for pharmacy services, and (4) Concerns about GPs resistance to pharmacist integration. Consumers felt that a pharmacist integrated into private prumary healthcare clinics could offer potential benefits such as counter-checking prescriptions to ensure correct medication is supplied and counselling consumers on their medications and the potential side effects. The potential to increase in costs to consumers and GPs reluctance were perceived as barriers to integration. Conclusion: This study provides insights into consumers perspectives on the roles of pharmacists within private primary healthcare clinics in Malaysia. Consumers generally supported pharmacist integration into private primary healthcare clinics. However, for pharmacists to expand their capacity in providing integrated and collaborative primary care services to consumers, barriers to pharmacist integration need to be addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Exhaust emissions were monitored in real-time at the kerb of a busy busway used by a mix of diesel and CNG-powered transport buses. Particle number concentration in the size range 3 nm to 3 µm was measured with a TSI condensation particle counter (CPC 3025). Particle mass (PM2.5) was measured with a TSI Dustrak 8520. The CO2 emissions were measured with a fast response CO2 analyser (Sable CA-10A). All emission concentrations were recorded in real time at 1 sec resolution, together with the precise passage times of buses. The instantaneous ratio of particle number (or mass) to CO2 concentration, denoted Z, was used as a measure of the particle number (or mass) emission factor of each passing bus.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Particle emission measurements from a fleet of 14 CNG and 5 Diesel buses were measured both for transient and steady state mode s on a chassis dynamometer with a CVS dilution system. Several transient DT80 cycles and 4 steady sate modes (0, 25, 50 100% of maximum load) were measured for each bus tested. Particle number concentration data was collected by three CPC’s (TSI 3022, 3010 3782WCPC) having D50 cut-offs set to 5, 10 and 20nm respectively. The size distributions were measured with a TSI 3080 SMPS with a 3025 CPC during the steady state modes. Particle mass emissions were measured with a TSI Dustrak. Particle mass emissions for Diesel buses were upto 2 orders of magnitude higher than for CNG buses. Particle number emissions during steady state modes for Diesel busses were 2 to 5 times higher than for CNG busses for all of the tested loads. On the other hand for the DT80 transient cycle particle number emissions were up to 3 times higher for the CNG buses. More detailed analysis of the transient cycles revealed that the reason for this was due to high particle number emissions from CNG busses during the acceleration parts of the cycles. Particles emitted by the CNG busses during acceleration were in the nucleation mode with the majority being smaller than 10nm. Volatility measurements have also shown that they were highly volatile.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the inception of the UN Convention on Biological Diversity (CBD) in 1992, little progress has been achieved in terms of involving the business community in protecting biological diversity worldwide. This article assesses the current activities of US Fortune 500 companies with respect to global biodiversity protection and the goals of the CBD. Data and information collected from 500 companies within eight major industrial sectors were further categorized at the company level to assess each company's involvement in global biodiversity protection. Our findings show that although companies' business profiles highly influence their decision-making process regarding the adoption of biodiversity protection policies and measures, their revenue profiles are less influential. We show that despite generating low revenues, companies in the utility sector are more active in the adoption of biodiversity protection policy than those in the financial sector, which generate high revenues. This study also demonstrates that companies must be convinced of the major effects of biodiversity loss on their bottom lines to be motivated to protect biological diversity. Companies' business and business-related risk profiles can also influence the adoption of biodiversity protection policies within the company. The study further demonstrates that a measurable biodiversity impact indicator is necessary for the companies to get seriously involved in the mitigation action. Finally, this study proposes a three-step biodiversity loss mitigation action framework that is drawn upon the assessment of the 500 companies that can contribute to develop an elaborative framework of business sector-specific mitigation plan. © 2013 Copyright Taylor and Francis Group, LLC.