209 resultados para Anonymity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymous communication has become a hot research topic in order to meet the increasing demand for web privacy protection. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay and bandwidth waste, which inhibits its use for web browsing. In this paper, we propose a predicted packet padding strategy to replace the dummy packet padding method for anonymous web browsing systems. The proposed strategy mitigates delay and bandwidth waste significantly on average. We formulated the traffic analysis attack and defense problem, and defined a metric, cost coefficient of anonymization (CCA), to measure the performance of anonymization. We thoroughly analyzed the problem with the characteristics of web browsing and concluded that the proposed strategy is better than the current dummy packet padding strategy in theory. We have conducted extensive experiments on two real world data sets, and the results confirmed the advantage of the proposed method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the February 2011 report on its inquiry into the past and present practices of donor conception in Australia, the Australian Senate Legal and Constitutional Affairs References Committee called for the introduction of legislation to regulate donor conception in all jurisdictions that do not have it in place "as a matter of priority". It further called for the establishment, "as a matter of priority", of a national register of donors to enable donor-conceived individuals to access identifying information about their donor. The Senate Committee left open the question as to whether the legislation and central register should have retrospective effect. This article focuses upon that question. It shows that arguments concerning the privacy, confidentiality and anonymity of some donors who may wish to remain anonymous are outweighed by the manifest injustice faced by donor-conceived individuals who are denied access to such information, as well as their families and donors who wish to exchange this information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two Australian government inquiries have recently called for the release of information to donor-conceived people about their gamete donors. A national inquiry, recommended ‘as a matter of priority’ that uniform legislation to be passed nationwide. A state-based inquiry argued that all donor-conceived people should have access to information and called for the enactment of retrospective legislation that would override donor anonymity. This paper responds to an opinion piece published in Human Reproduction in October 2012 by Professor Pennings in which he criticized such recommendations and questioned the motives of people that advocate for information release. I answer the arguments of Pennings, and argue that all parties affected by donor conception should be considered, and a compromise reached. The contact veto system is one such compromise. I discuss the education and support services recommended by the Victorian government and question Pennings' assertions that legislation enabling information release will lead to a decrease in gamete donation. Finally, I rebut Pennings' assertion that there is a ‘hidden agenda’ behind the call for information release. There is no such agenda in my work. If there is from others, then it is their discriminatory views that need to be addressed, not the move toward openness and honesty or the call for information by donor-conceived people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although much work has been done to provide privacy and anonymity, little focus has been given to ensure RFID data confidentiality, integrity and to address the tampered data recovery problem. To this end, we propose a lightweight stenographic-based approach to ensure RFID data confidentiality and integrity as well as the recovery of tampered RFID data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose a novel approach to secure ownership transfer in RFID systems based on the quadratic residue property. We present two secure ownership transfer schemes-the closed loop and open loop schemes. An important property of our schemes is that ownership transfer is guaranteed to be atomic. Further, both our schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use operations that such passive RFID tags are capable of. We provide a detailed security analysis to show that our schemes achieve strong privacy and satisfy the required security properties of tag anonymity, tag location privacy, forward secrecy, and forward untraceability. We also show that the schemes are resistant to replay (both passive and algebraic), desynchronization, and server impersonation attacks. Performance comparisons demonstrate that our schemes are practical and can be implemented on low-cost passive RFID tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the range of free services available in Australia, few family and friends of people with problem gambling access them. Over recent years, the Australian gambling help service system has expanded to include web-based counselling. Family and friends make up approximately 15% of people accessing this new modality, however little is known of the reasons for choosing this form of assistance over other interventions. This research aimed to understand the reasons family and friends choose to use single-session web-based counselling over other modes (i.e., face-to-face and telephone), as well as why they would recommend it to other affected people.

The study involved 63 participants (70% intimate partners, 13% children, 6% friends, 5% parents, 6% other family members) who completed openended questions on reasons for using and recommending web-based counselling, with over three-quarters of the sample seeking help for the first time.

A descriptive content analysis revealed multiple overlapping themes, including ease of access (41.3% of reasons for choosing), privacy and anonymity (17.5%), and a preference for the characteristics inherent in the therapeutic medium (23.8%). We also found webbased counselling provided a pathway into services (11.1%) and that the intervention provided was viewed as helpful and a reason for recommendation (34.9% of reasons for recommending).

This research provides important new information on the help seeking preferences of family and friends. Future research is required to understand the relationship between reasons for use, help-seeking preferences and the effectiveness of single-session web-based counselling for people affected by problem gambling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background:

For highly stigmatized disorders, such as problem gambling, Web-based counseling has the potential to address common barriers to treatment, including issues of shame and stigma. Despite the exponential growth in the uptake of immediate synchronous Web-based counseling (ie, provided without appointment), little is known about why people choose this service over other modes of treatment.
Objective:
The aim of the current study was to determine motivations for choosing and recommending Web-based counseling over telephone or face-to-face services.
Methods:
The study involved 233 Australian participants who had completed an online counseling session for problem gambling on the Gambling Help Online website between November 2010 and February 2012. Participants were all classified as problem gamblers, with a greater proportion of males (57.4%) and 60.4% younger than 40 years of age. Participants completed open-ended questions about their reasons for choosing online counseling over other modes (ie, face-to-face and telephone), as well as reasons for recommending the service to others.
Results:
A content analysis revealed 4 themes related to confidentiality/anonymity (reported by 27.0%), convenience/accessibility (50.9%), service system access (34.2%), and a preference for the therapeutic medium (26.6%). Few participants reported helpful professional support as a reason for accessing counseling online, but 43.2% of participants stated that this was a reason for recommending the service.Those older than 40 years were more likely than younger people in the sample to use Web-based counseling as an entry point into the service system (<italic>P</italic>=.045), whereas those engaged in nonstrategic gambling (eg, machine gambling) were more likely to access online counseling as an entry into the service system than those engaged in strategic gambling (ie, cards, sports; <italic>P</italic>=.01). Participants older than 40 years were more likely to recommend the service because of its potential for confidentiality and anonymity (<italic>P</italic>=.04), whereas those younger than 40 years were more likely to recommend the service due to it being helpful (<italic>P</italic>=.02).
Conclusions:
This study provides important information about why online counseling for gambling is attractive to people with problem gambling, thereby informing the development of targeted online programs, campaigns, and promotional material.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article reflects on a university human research ethics committee’s unease regarding a feminist visual pilot study within the field of education. The small exploratory study proposed to explore a migrant mother’s production of her son’s identity through her family photograph collection. The committee requested substantial changes to the research design which centred primarily on their concerns regarding risk of harm to pre-existing relationships, and also issues of anonymity and consent. I consider the combined liberal individualist, utilitarian and positivist biomedical basis for the ethics committee’s discomfort with the proposed research which was to involve members of my family. I draw on my experience of the review process to critique the human research ethics committee paradigm which constructs the ideal researcher as an objective and disinterested observer, hinges on a weighing of risks and benefits, and considers humans to be independent and equal. I demonstrate how the blanket application of these values acts to problematise some kinds of research, and how these values can be inappropriate, incompatible and even destructive when applied to research proposals that are exploratory, visual, and/or involve the researcher’s family members as participants.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although there are lots of work to provide privacy and anonymity, little focus has been given to ensure confidentiality and integrity of RFID tag data. To this end, we propose a lightweight hybrid approach based on stenographic and watermarking to ensure data confidentiality, linkability resistance and integrity on the RFID tags data. The proposed technique is capable of tampered data recovering and restoring for RFID tag. It has been validated and tested on EPC class 1 gen2 tags.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing measure method employed to mitigate these problems. In this paper, we propose a novel secure and anonymous source routing protocol, called SADSR, based on Dynamic Source Routing (DSR) for wireless ad hoc networks. In the proposed scheme, we use the pseudonym, pseudonym based cryptography and the bloom filter to establish secure and anonymous routing in wireless ad hoc networks. Compared to other anonymous routing protocol, SADSR is not only anonymous but also the secure in the routing discover process and data transmission process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols. © 2014 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present paper aims to review current evidence for the effectiveness and/or feasibility of using inter-agency data sharing of ED recorded assault information to direct interventions reducing alcohol-related or nightlife assaults, injury or violence. Potential data-sharing partners involve police, local council, liquor licensing regulators and venue management. A systematic review of the peer-reviewed literature was conducted. The initial search discovered 19,506 articles. After removal of duplicates and articles not meeting review criteria, n = 8 articles were included in quantitative and narrative synthesis. Seven of eight studies were conducted in UK EDs, with the remaining study presenting Australian data. All studies included in the review deemed data sharing a worthwhile pursuit. All studies attempting to measure intervention effectiveness reported substantial reductions of assaults and ED attendances post-intervention, with one reporting no change. Negative logistic feasibility concerns were minimal, with general consensus among authors being that data-sharing protocols and partnerships could be easily implemented into modern ED triage systems, with minimal cost, staff workload burden, impact to patient safety, service and anonymity, or risk of harm displacement to other licensed venues, or increase to length of patient stay. However, one study reported a potential harm displacement effect to streets surrounding intervention venues. In future, data-sharing systems should triangulate ED, police and ambulance data sources, and assess intervention effectiveness using randomised controlled trials that account for variations in venue capacity, fluctuations in ED attendance and population levels, seasonal variations in assault and injury, and control for concurrent interventions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When educational research is conducted online, we sometimes promise our participants that they will be anonymous—but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical study into the prevalence of direct quotes from participants in a subset of the educational technology literature. Using basic web search techniques, the source of direct quotes could be found in 10 of 112 articles. Analysis of the articles revealed previously undiscussed threats from data triangulation and expert analysis/diagnosis. Issues of ethical obliviousness, obscurity and concern for future privacy-invasive technologies are also discussed. Recommendations for researchers, journals and institutional ethics review boards are made for how to better protect participants' anonymity against current and future threats.