997 resultados para authentication test


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article analyses the legality of Israel’s 2007 airstrike on an alleged Syrian nuclear facility at Al-Kibar—an incident that has been largely overlooked by international lawyers to date. The absence of a threat of imminent attack from Syria means Israel’s military action was not a lawful exercise of anticipatory self-defence. Yet, despite Israel’s clear violation of the prohibition on the use of force there was remarkably little condemnation from other states, suggesting the possibility of growing international support for the doctrine of pre-emptive self-defence. This article argues that the muted international reaction to Israel’s pre-emptive action was the result of political factors, and should not be seen as endorsement of the legality of the airstrike. As such, a lack of opinio juris means the Al-Kibar episode cannot be viewed as extending the scope of the customary international law right of self-defence so as to permit the use of force against non-imminent threats. However, two features of this incident—namely, Israel’s failure to offer any legal justification for its airstrike, and the international community’s apparent lack of concern over legality—are also evident in other recent uses of force in the ‘war on terror’ context. These developments may indicate a shift in state practice involving a downgrading of the role of international law in discussions of the use of force. This may signal a declining perception of the legitimacy of the jus ad bellum, at least in cases involving minor uses of force.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While in many travel situations there is an almost limitless range of available destinations, travellers will usually only actively consider two to six in their decision set. One of the greatest challenges facing destination marketers is positioning their destination, against the myriad of competing places that offer similar features, into consumer decision sets. Since positioning requires a narrow focus, marketing communications must present a succinct and meaningful proposition, the selection of which is often problematic for destination marketing organisations (DMO), which deal with a diverse and often eclectic range of attributes in addition to self-interested and demanding stakeholders who have interests in different market segments. This paper reports the application of two qualitative techniques used to explore the range of cognitive attributes, consequences and personal values that represent potential positioning opportunities in the context of short break holidays. The Repertory Test is an effective technique for understanding the salient attributes used by a traveller to differentiate destinations, and Laddering Analysis enables the researcher to explore the smaller set of consequences and personal values guiding such decision making. A key finding of the research was that while individuals might vary in their repertoire of salient attributes, there was a commonality of shared consequences and values. This has important implications for DMOs, since a brand positioning theme that is based on a value will subsume multiple and diverse attributes. It is posited that such a theme will appeal to a broader range of travellers, as well as appease a greater number of destination stakeholders, than would an attribute based theme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mechanical damages such as bruising, collision and impact during food processing stages diminish quality and quantity of productions as well as efficiency of operations. Studying mechanical characteristics of food materials will help to enhance current industrial practices. Mechanical properties of fruits and vegetables describe how these materials behave under loading in real industrial operations. Optimizing and designing more efficient equipments require accurate and precise information of tissue behaviours. FE modelling of food industrial processes is an effective method of studying interrelation of variables during mechanical operation. In this study, empirical investigation has been done on mechanical properties of pumpkin peel. The test was a part of FE modelling and simulation of mechanical peeling stage of tough skinned vegetables. The compression test has been conducted on Jap variety of pumpkin. Additionally, stress strain curve, bio-yield and toughness of pumpkin skin have been calculated. The required energy for reaching bio-yield point was 493.75, 507.71 and 451.71 N.mm for 1.25, 10 and 20 mm/min loading speed respectively. Average value of force in bio-yield point for pumpkin peel was 310 N.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose. To determine how Developmental Eye Movement (DEM) test results relate to reading eye movement patterns recorded with the Visagraph in visually normal children, and whether DEM results and recorded eye movement patterns relate to standardized reading achievement scores. Methods. Fifty-nine school-age children (age = 9.7 ± 0.6 years) completed the DEM test and had eye movements recorded with the Visagraph III test while reading for comprehension. Monocular visual acuity in each eye and random dot stereoacuity were measured and standardized scores on independently administered reading comprehension tests [reading progress test (RPT)] were obtained. Results. Children with slower DEM horizontal and vertical adjusted times tended to have slower reading rates with the Visagraph (r = -0.547 and -0.414 respectively). Although a significant correlation was also found between the DEM ratio and Visagraph reading rate (r = -0.368), the strength of the relationship was less than that between DEM horizontal adjusted time and reading rate. DEM outcome scores were not significantly associated with RPT scores. When the relative contribution of reading ability (RPT) and DEM scores was accounted for in multivariate analysis, DEM outcomes were not significantly associated with Visagraph reading rate. RPT scores were associated with Visagraph outcomes of duration of fixations (r = -0.403) and calculated reading rate (r = 0.366) but not with DEM outcomes. Conclusions.DEM outcomes can identify children whose Visagraph recorded eye movement patterns show slow reading rates. However, when reading ability is accounted for, DEM outcomes are a poor predictor of reading rate. Visagraph outcomes of duration of fixation and reading rate relate to standardized reading achievement scores; however, DEM results do not. Copyright © 2011 American Academy of Optometry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The great male Aussie cossie is growing spots. The ‘dick’ tog, as it is colloquially referred to, is linked to Australia’s national identify with overtly masculine bronzed Aussie bodies clothed in this iconic apparel. Yet the reality is our hunger for worshiping the sun and the addiction to a beach lifestyle is tempered by the pragmatic need for neck-to-knee, or more apt head-to-toe, swimwear. Spotty Dick is an irreverent play on male swimwear – it experiments with alternate modes to sheath the body with Lyrca in order to protect it from searing UV’s and at the same time light-heartedly fools around with texture and pattern; to be specific, black Scharovsky crystals, jewelled in spot patterns - jewelled clothing is not characteristically aligned to menswear and even less so to the great Aussie cossie. The crystals form a matrix of spots that attempt to provoke a sense of mischievousness aligned to the Aussie beach larrikin. Ironically, spot patterns are in itself a form of a parody, as prolonged sun exposure ages the skin and sun spots can occur if appropriate sun protection is not used. ‘Spotty Dick’ – a research experiment to test design suitability for the use of jewelled spot matrix patterns for UV aware men’s swimwear. The creative work was paraded at 56 shows, over a 2 week period, and an estimated 50,000 people viewed the work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: Parental illness (PI) may have adverse impacts on youth and family functioning. Research in this area has suffered from the absence of a guiding comprehensive framework. This study tested a conceptual model of the effects of PI on youth and family functioning derived from the Family Ecology Framework (FEF; Pedersen & Revenson, 2005). Method. A total of 85 parents with multiple sclerosis and 127 youth completed questionnaires at Time 1 and 12 months later at Time 2. Results. Structural equation modeling results supported the FEF with regards to physical-illness disability. Specifically, the proposed mediators (role redistribution, stress, and stigma) were implicated in the processes that link parental disability to several domains of youth adjustment. The results suggest that the effects of parental depression (PD) are not mediated through these processes; rather, PD directly affects family functioning, which in turn mediates the effects onto youth adjustment. Family functioning further mediated between PD and youth well-being and behavioral-social difficulties. Conclusions. Although results support the effects of parental-illness disability on youth and family functioning via the proposed mediational mechanisms, the additive effects of PD on youth physical and mental health occur through direct and indirect (via family functioning) pathways, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.