955 resultados para Torá


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to investigate a public workforce education initiative in the context of State and agency policies designed to enhance employee capabilities to adapt to a volatile and changing environment. In particular, we are concerned with public employees’ experience of a higher educational pathway that resulted in their obtaining a Diploma level qualification. In addition to understanding the employees’ experience of this pathway we were interested in whether the experience contributed to their openness to the prospect of university level education. We conducted telephone interviews with a sample of participants from the program. Employees reported very positive experience of the program; in particular employees reported enhanced efficacy beliefs, a strong sense of achievement, and a feeling of recognition. This experience is explained by four main factors; (1) a program design that was well aligned with the employees learning needs, (2) strong support by organisational staff who delivered and assessed participants on capability criteria, (3) strong management support for employees’ participation, (4) an academic ceremony that provided participants with public recognition of their achievement by valued others. Participants’ motivation to participate was primarily intrinsic rather than extrinsic. Participants in the study reported that their experience in this educational pathway gave them the confidence to consider the possibility of university level education. The paper also discusses the practitioner-academic collaboration that led to the development of this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this paper is to bring leadership context into sharper focus and to suggest there are strong constraints on public leaders’ discretion to lead in ways consistent with NPM or NPL. Much of the existing public leadership research focuses on the individual leader and tends to give little attention to the influence of context. This lack of focus on leader context adversely affects our ability to build public leadership capacity. We draw on prior research to establish that (1) there are strong contextual constraints on public leaders’ capacity to lead in ways consistent with NPL, (2) public leaders are subject to contradictory messages and for the most part these contradictions are unacknowledged and unresolved, the impact of which is confusion and informal power-politics, (3) the task of leader transition from traditional leadership to new public leadership is very much underestimated and requires a new way to think about leadership development. On the basis of this analysis, we argue that public leaders find themselves between a rock and a hard place.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Governments increasingly rely on forms of privatisation to provide critical public infrastructure yet when those infrastructures fail to meet community expectations government bears the political and economic risks, being held accountable by the public as steward for those infrastructures. Reconfiguration of the contractual relationships may achieve better stewardship. Many of the forms of privatization rely on Agency theory prescriptions, conceptualizing organisations and individuals as motivated solely by self-interest. Stewardship theory (Van Slyke 2007) has developed as a complement to Agency theory offering the possibility of contractual relationships which maximize stewardship outcome. Stewardship theory asserts that pro-stewardship factors cause the agent/steward to act in the interests of the principal. This research has interrogated the literature finding that of the pro-stewardship factors, sense of responsibility is pre-eminent and has a significant link to the agent acting as a steward. The research has explored how important it is that the steward feel sense of responsibility and the actions that sense of responsibility. Case studies of privatized core elements of urban water systems infrastructure were explored. Data has been gathered primarily from archival sources and individual interviews of government and private sector executives key to those systems. This paper reports the findings as to the extent of stewardship, how important it is that the steward acts in the interests of the principal, even to the steward’s detriment and the importance of the steward feeling a sense of responsibility. The actions which increase that sense of responsibility will be assembled to position the research to better proceed with the analysis of the data as to these actions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: Electronic Portal Imaging Devices (EPIDs) are available with most linear accelerators (Amonuk, 2002), the current technology being amorphous silicon flat panel imagers. EPIDs are currently used routinely in patient positioning before radiotherapy treatments. There has been an increasing interest in using EPID technology tor dosimetric verification of radiotherapy treatments (van Elmpt, 2008). A straightforward technique involves the EPID panel being used to measure the fluence exiting the patient during a treatment which is then compared to a prediction of the fluence based on the treatment plan. However, there are a number of significant limitations which exist in this Method: Resulting in a limited proliferation ot this technique in a clinical environment. In this paper, we aim to present a technique of simulating IMRT fields using Monte Carlo to predict the dose in an EPID which can then be compared to the measured dose in the EPID. Materials: Measurements were made using an iView GT flat panel a-SI EPfD mounted on an Elekta Synergy linear accelerator. The images from the EPID were acquired using the XIS software (Heimann Imaging Systems). Monte Carlo simulations were performed using the BEAMnrc and DOSXVZnrc user codes. The IMRT fieids to be delivered were taken from the treatment planning system in DICOMRT format and converted into BEAMnrc and DOSXYZnrc input files using an in-house application (Crowe, 2009). Additionally. all image processing and analysis was performed using another in-house application written using the Interactive Data Language (IDL) (In Visual Information Systems). Comparison between the measured and Monte Carlo EPID images was performed using a gamma analysis (Low, 1998) incorporating dose and distance to agreement criteria. Results: The fluence maps recorded by the EPID were found to provide good agreement between measured and simulated data. Figure 1 shows an example of measured and simulated IMRT dose images and profiles in the x and y directions. "A technique for the quantitative evaluation of dose distributions", Med Phys, 25(5) May 1998 S. Crowe, 1. Kairn, A. Fielding, "The Development of a Monte Carlo system to verify Radiotherapy treatment dose calculations", Radiotherapy & Oncology, Volume 92, Supplement 1, August 2009, Pages S71-S71.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study aims to redefine spaces of learning to places of learning through the direct engagement of local communities as a way to examine and learn from real world issues in the city. This paper exemplifies Smart City Learning, where the key goal is to promote the generation and exchange of urban design ideas for the future development of South Bank, in Brisbane, Australia, informing the creation of new design policies responding to the needs of local citizens. Specific to this project was the implementation of urban informatics techniques and approaches to promote innovative engagement strategies. Architecture and Urban Design students were encouraged to review and appropriate real-time, ubiquitous technology, social media, and mobile devices that were used by urban residents to augment and mediate the physical and digital layers of urban infrastructures. Our study’s experience found that urban informatics provide an innovative opportunity to enrich students’ place of learning within the city.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: A recent study by Dhillon et al. [12], identified both angioinvasion and mTOR as prognostic biomarkers for poor survival in early stage NSCLC. The aim of this study was to verify the above study by examining the angioinvasion and mTOR expression profile in a cohort of early stage NSCLC patients and correlate the results to patient clinico-pathological data and survival. Methods: Angioinvasion was routinely recorded by the pathologist at the initial assessment of the tumor following resection. mTOR was evaluated in 141 early stage (IA-IIB) NSCLC patients (67 - squamous; 60 - adenocarcinoma; 14 - others) using immunohistochemistry (IHC) analysis with an immunohistochemical score (IHS) calculated (% positive cells × staining intensity). Intensity was scored as follows: 0 (negative); 1+ (weak); 2+ (moderate); 3+ (strong). The range of scores was 0-300. Based on the previous study a cut-off score of 30 was used to define positive versus negative patients. The impact of angioinvasion and mTOR expression on prognosis was then evaluated. Results: 101 of the 141 tumors studied expressed mTOR. There was no difference in mTOR expression between squamous cell carcinoma and adenocarcinoma. Angioinvasion (p= 0.024) and mTOR staining (p= 0.048) were significant univariate predictors of poor survival. Both remained significant after multivariate analysis (p= 0.037 and p= 0.020, respectively). Conclusions: Our findings verify angioinvasion and mTOR expression as new biomarkers for poor outcome in patients with early stage NSCLC. mTOR expressing patients may benefit from novel therapies targeting the mTOR survival pathway. © 2011 Elsevier Ireland Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A control allocation system implements a function that maps the desired control forces generated by the vehicle motion controller into the commands of the different actuators. In this article, a survey of control allocation methods for over-actuated underwater vehicles is presented. The methods are applicable for both surface vessels and underwater vehicles. The paper presents a survey of control allocation methods with focus on mathematical representation and solvability of thruster allocation problems. The paper is useful for university students and engineers who want to get an overview of state-of-the art control allocation methods as well as advance methods to solve more complex problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"...The mTOR protein expression in colorectal adenomas has not been widely reported in the literature. Our recent study demonstrated no significant difference in mTOR protein expression in adenomas compared to carcinomas of the large intestine [1]. However, mTOR mRNA showed lower expression in colorectal adenomas compared to colorectal adenocarcinomas..."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated the clinicopathologic roles of mammalian target of rapamycin (mTOR) expression and its relationship to carcinogenesis and tumor progression in a colorectal adenoma-adenocarcinoma model. Two colon cancer cell lines with different pathologic stages (SW480 and SW48) and 1 normal colonic epithelial cell line (FHC) were used, in addition to 119 colorectal adenocarcinomas and 32 adenomas. mTOR expression profiles at messenger RNA (mRNA) and protein levels were investigated in the cells and tissues using real-time quantification polymerase chain reaction and immunohistochemistry. The findings were correlated with the clinicopathologic features of the tumors. The colon cell line from stage III cancer (SW48) showed higher expression of mTOR mRNA than that from stage II cancer (SW480). At the tissue level, mTOR showed higher mRNA and protein expression in colorectal carcinoma than in adenoma. The mRNA and protein expression was correlated with each other in approximately one-third of the carcinomas and adenomas. High levels of mTOR mRNA expression were noted more in carcinoma or adenoma arising from the distal portion of the large intestine (P = .025 and .019, respectively). Within the colorectal cancer population, a high level of expression of mTOR mRNA was related to the presence of lymph node metastases (P = .031), advanced pathologic stage (P = .05), and presence of persistent disease or tumor recurrence (P = .035). To conclude, the study has indicated that mTOR is likely to be involved in the development and progression of colorectal cancer and is linked to cancer initiation, invasiveness, and progression.