990 resultados para common identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

‘Adolescence’ has become increasingly recognised as a nebulous concept. Previous conceptualisations of adolescence have adopted a ‘deficit’ view, regarding teenagers as ‘unfinished’ adults. The deficit view of adolescence is highly problematic in an era where adulthood itself is difficult to define. The terms ‘kidult’ or ‘adultescent’ have emerged to describe adult-age people whose interests and priorities match those of their teenage counterparts. Rather than relying on ‘lock-step’ models of physical, cognitive and social growth put forward by developmental psychology, adolescence can be more usefully defined by looking at the common experiences of people in their teenage years. Common experiences arise at an institutional level; for example, all adolescents are treated as the same by legal and education systems. The transition from primary to secondary schooling is a milestone for all children, exposing them to a new type of educational environment. Shared experiences also arise from generational factors. Today’s adolescents belong to the millennial generation, characterised by technological competence, global perspectives, high susceptibility to media influence, individualisation and rapid interactions. This generation focuses on teamwork, achievement, modesty and good conduct, and has great potential for significant collective accomplishments. These generational factors challenge educators to provide relevant learning experiences for today’s students. Many classrooms still utilise textbook-based pedagogy more suited to previous generations, resulting in disengagement among millennial students. Curriculum content must also be tailored to generational needs. The rapid pace of change, as well as the fluidity of identity created by dissolving geographical and vocational boundaries, mean that the millennial generation will need more than a fixed set of skills and knowledge to enter adulthood. Teachers must enable their students to think like ‘expert novices’, adept at assimilating new concepts in depth and prepared to engage in lifelong learning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay explores the political significance of Balinese death/thrash fandom. In the early 1990s, the emergence of a death/thrash scene in Bali paralleled growing criticism of accelerated tourism development on the island. Specifically, locals protested the increasing ubiquity of Jakarta, 'the centre', cast as threatening to an authentically 'low', peripheral Balinese culture. Similarly, death/thrash enthusiasts also gravitated toward certain fringes, although they rejected dominant notions of Balinese-ness by gesturing elsewhere, toward a global scene. The essay explores the ways in which death/thrash enthusiasts engaged with local discourses by coveting their marginality, and aims to demonstrate how their articulations of 'alien-ness' contributed in important ways to a broader regionalism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this review, the authors interrogate the recent identity turn in literacy studies by asking the following: How do particular views of identity shape how researchers think about literacy and, conversely, how does the view of literacy taken by a researcher shape meanings made about identity? To address this question, the authors review various ways of conceptualizing identity by using five metaphors for identity documented in the identity literature: identity as (1) difference, (2) sense of self/subjectivity, (3) mind or consciousness, (4) narrative, and (5) position. Few literacy studies have acknowledged this range of perspectives on and views for conceptualizing identity and yet, subtle differences in identity theories have widely different implications for how one thinks about both how literacy matters to identity and how identity matters to literacy. The authors offer this review to encourage more theorizing of both literacy and identity as social practices and, most important, of how the two breathe life into each other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (CSA-SC). Firstly, a new representation of CSA-SC with a state size of only 89 bits is given, a significant reduction from the 103 bit state of a previous CSA-SC representation. Analysis of this 89-bit representation demonstrates that the basis of a previous guess-and-determine attack is flawed. Correcting this flaw increases the complexity of that attack so that it is worse than exhaustive key search. Although that attack is not feasible, the reduced state size of our representation makes it obvious that CSA-SC is vulnerable to several generic attacks, for which feasible parameters are given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The common brown leafhopper, Orosius orientalis (Matsumura) (Homoptera: Cicadellidae), previously described as Orosius argentatus (Evans), is an important vector of several viruses and phytoplasmas worldwide. In Australia, phytoplasmas vectored by O. orientalis cause a range of economically important diseases, including legume little leaf (Hutton & Grylls, 1956), tomato big bud (Osmelak, 1986), lucerne witches broom (Helson, 1951), potato purple top wilt (Harding & Teakle, 1985), and Australian lucerne yellows (Pilkington et al., 2004). Orosius orientalis also transmits Tobacco yellow dwarf virus (TYDV; genus Mastrevirus, family Geminiviridae) to beans, causing bean summer death disease (Ballantyne, 1968), and to tobacco, causing tobacco yellow dwarf disease (Hill, 1937, 1941). TYDV has only been recorded in Australia to date. Both diseases result in significant production and quality losses (Ballantyne, 1968; Thomas, 1979; Moran & Rodoni, 1999). Although direct damage caused by leafhopper feeding has been observed, it is relatively minor compared to the losses resulting from disease (P Tr E bicki, unpubl.).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A simple mimetic of a heparan sulfate disaccharide sequence that binds to the growth factors FGF-1 and FGF-2 was synthesized by coupling a 2-azido-2-deoxy-D-glucosyl trichloroacetimidate donor with a 1,6-anhydro-2-azido-2-deoxy--D-glucose acceptor. Both the donor and acceptor were obtained from a common intermediate readily obtained from D-glucal. Molecular docking calculations showed that the predicted locations of the disaccharide sulfo groups in the binding site of FGF-1 and FGF-2 are similar to the positions observed for co-crystallized heparin-derived oligosaccharides obtained from published crystal structures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research examines how men react to male models in print advertisements. In two experiments, we show that the gender identity of men influences their responses to advertisements featuring a masculine, feminine, or androgynous male model. In addition, we explore the extent to which men feel they will be classified by others as similar to the model as a mechanism for these effects. Specifically, masculine men respond most favorably to masculine models and are negative toward feminine models. In contrast, feminine men prefer feminine models when their private self is salient. Yet in a collective context, they prefer masculine models.These experiments shed light on how gender identity and self-construal influence male evaluations and illustrate the social pressure on men to endorse traditional masculine portrayals. We also present implications for advertising practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While LRD (living donation to a genetically/emotionally related recipient) is well established in Australia, LAD (living anonymous donation to a stranger) is rare. Given the increasing use of LAD overseas, Australia may likely follow suit. Understanding the determinants of people’s willingness for LAD is essential but infrequently studied in Australia. Consequently, we compared the determinants of people’s LRD and LAD willingness, and assessed whether these determinants differed according to type of living donation. We surveyed 487 health students about their LRD and LAD willingness, attitudes, identity, prior experience with blood and organ donation, deceased donation preference, and demographics. We used Structural Equation Modelling (SEM) to identify the determinants of willingness for LRD and LAD and paired sample t-tests to examine differences in LRD and LAD attitudes, identity, and willingness. Mean differences in willingness (LRD 5.93, LAD 3.92), attitudes (LRD 6.43, LAD 5.53), and identity (LRD 5.69, LAD 3.58) were statistically significant. Revised SEM models provided a good fit to the data (LRD: x2 (41) = 67.67, p = 0.005, CFI = 0.96, RMSEA = 0.04; LAD: x2 (40) = 79.64, p < 0.001, CFI = 0.95, RMSEA = 0.05) and explained 45% and 54% of the variation in LRD and LAD willingness, respectively. Four common determinants of LRD and LAD willingness emerged: identity, attitude, past blood donation, and knowing a deceased donor. Religious affiliation and deceased donation preference predicted LAD willingness also. Identifying similarities and differences in these determinants can inform future efforts aimed at understanding people’s LRD and LAD willingness and the evaluation of potential living donor motives. Notably, this study highlights the importance of people’s identification as a living donor as a motive underlying their willingness to donate their organs while living.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explores articulations of queer identity in recent Australian queer student media. Print media is of particular importance to queer communities because, as Cover argues, it provides a crucial grounding for community development and a model of queer to guide the positioning of identity and activism. This article uses discourse analysis of queer student activists’ media representations of diversity and inclusiveness to investigate the articulations of queer identity in one specific context: metropolitan Australian universities. This reveals real-life appropriations of this contentious term and contributes to a genealogy of sexuality, documenting one visible moment in history.