979 resultados para Security properties


Relevância:

20.00% 20.00%

Publicador:

Resumo:

UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rationale for the present study was to develop porous CaP/silk composite scaffolds with a CaP-phase distribution and pore architecture better suited to facilitate osteogenic properties of human bone mesenchymal stromal cells (BMSCs) and in vivo bone formation abilities. This was achieved by first preparing CaP/silk hybrid powders which were then incorporated into silk to obtain uniform CaP/silk composite scaffolds, by means of a freeze-drying method. The composition, microstructure and mechanical properties of the CaP/silk composite scaffolds were ascertained by X-ray diffraction (XRD), Fourier transform infrared spectra (FTIR), scanning electron microscope (SEM) and a universal mechanical testing machine. BMSCs were cultured in these scaffolds and cell proliferation analyzed by confocal microscopy and MTS assay. Alkaline phosphatase (ALP) activity and osteogenic gene expression were assayed to determine if osteogenic differentiation had taken place. A calvarial defect model in SCID mice was used to determine the in vivo bone forming ability of the hybrid CaP/silk scaffolds. Our results showed that incorporating the hybrid CaP/silk powders into silk scaffolds improved both pore structure architecture and distribution of CaP powders in the composite scaffolds. By incorporating the CaP phase into silk scaffolds in vitro osteogenic differentiation of BMSCs was enhanced and there was increased in vivo cancellous bone formation. Here we report a method with which to prepare Ca/P composite scaffolds with a pore structure and Ca/P distribution better suited to facilitate BMSC differentiation and bone formation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Following the collapse across the last decade of a number of large organizations such as Enron in the USA and several domestic organizations including Ansett Airlines, HIH Insurance and One.Tel, much discussion has ensued about the need to secure employee entitlements. However, tangible improvements in this area are elusive. Good corporate governance policies would suggest that deferred obligations as well as current debts should not be neglected and that appropriate arrangements be put in place to adequately fund employee entitlements. In this paper we consider recent Australian attempts to introduce better governance of employee entitlements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Microsphere systems with the ideal properties for bone regeneration need to be bioactive, and at the same time possess the capacity for controlled protein/drug-delivery; however, the current crop of microsphere system fails to fulfill these properties. The aim of this study was to develop a novel protein-delivery system of bioactive mesoporous glass (MBG) microspheres by a biomimetic method through controlling the density of apatite on the surface of microspheres, for potential bone tissue regeneration. MBG microspheres were prepared by using the method of alginate cross-linking with Ca2+ ions. The cellular bioactivity of MBG microspheres was evaluated by investigating the proliferation and attachment of bone marrow stromal cell (BMSC). The loading efficiency and release kinetics of bovine serum albumin (BSA) on MBG microspheres were investigated after coprecipitating with biomimetic apatite in simulated body fluids (SBF). The results showed that MBG microspheres supported BMSC attachment and the Si containing ionic products from MBG microspheres stimulated BMSCs proliferation. The density of apatite on MBG microspheres increased with the length of soaking time in SBF. BSA-loading efficiency of MBG was significantly enhanced by co-precipitating with apatite. Furthermore, the loading efficiency and release kinetics of BSA could be controlled by controlling the density of apatite formed on MBG microspheres. Our results suggest that MBG microspheres are a promising protein-delivery system as a filling material for bone defect healing and regeneration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the gaps in monitoring and surveillance identified while conducting Community Food Security assessments in three geographical areas located in south-east Queensland, Australia

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Altered mechanical properties of the heel pad have been implicated in the development of plantar heel pain. However, the in vivo properties of the heel pad during gait remain largely unexplored in this cohort. The aim of the current study was to characterise the bulk compressive properties of the heel pad in individuals with and without plantar heel pain while walking. ---------- Methods: The sagittal thickness and axial compressive strain of the heel pad were estimated in vivo from dynamic lateral foot radiographs acquired from nine subjects with unilateral plantar heel pain and an equivalent number of matched controls, while walking at their preferred speed. Compressive stress was derived from simultaneously acquired plantar pressure data. Principal viscoelastic parameters of the heel pad, including peak strain, secant modulus and energy dissipation (hysteresis), were estimated from subsequent stress–strain curves.---------- Findings: There was no significant difference in loaded and unloaded heel pad thickness, peak stress, peak strain, or secant and tangent modulus in subjects with and without heel pain. However, the fat pad of symptomatic feet had a significantly lower energy dissipation ratio (0.55 ± 0.17 vs. 0.69 ± 0.08) when compared to asymptomatic feet (P < .05).---------- Interpretation: Plantar heel pain is characterised by reduced energy dissipation ratio of the heel pad when measured in vivo and under physiologically relevant strain rates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To demonstrate properties of the International Classification of the External Cause of Injury (ICECI) as a tool for use in injury prevention research. Methods: The Childhood Injury Prevention Study (CHIPS) is a prospective longitudinal follow up study of a cohort of 871 children 5–12 years of age, with a nested case crossover component. The ICECI is the latest tool in the International Classification of Diseases (ICD) family and has been designed to improve the precision of coding injury events. The details of all injury events recorded in the study, as well as all measured injury related exposures, were coded using the ICECI. This paper reports a substudy on the utility and practicability of using the ICECI in the CHIPS to record exposures. Interrater reliability was quantified for a sample of injured participants using the Kappa statistic to measure concordance between codes independently coded by two research staff. Results: There were 767 diaries collected at baseline and event details from 563 injuries and exposure details from injury crossover periods. There were no event, location, or activity details which could not be coded using the ICECI. Kappa statistics for concordance between raters within each of the dimensions ranged from 0.31 to 0.93 for the injury events and 0.94 and 0.97 for activity and location in the control periods. Discussion: This study represents the first detailed account of the properties of the ICECI revealed by its use in a primary analytic epidemiological study of injury prevention. The results of this study provide considerable support for the ICECI and its further use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Gabor representations have been widely used in facial analysis (face recognition, face detection and facial expression detection) due to their biological relevance and computational properties. Two popular Gabor representations used in literature are: 1) Log-Gabor and 2) Gabor energy filters. Even though these representations are somewhat similar, they also have distinct differences as the Log-Gabor filters mimic the simple cells in the visual cortex while the Gabor energy filters emulate the complex cells, which causes subtle differences in the responses. In this paper, we analyze the difference between these two Gabor representations and quantify these differences on the task of facial action unit (AU) detection. In our experiments conducted on the Cohn-Kanade dataset, we report an average area underneath the ROC curve (A`) of 92.60% across 17 AUs for the Gabor energy filters, while the Log-Gabor representation achieved an average A` of 96.11%. This result suggests that small spatial differences that the Log-Gabor filters pick up on are more useful for AU detection than the differences in contours and edges that the Gabor energy filters extract.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A major challenge of the 21st century will be to generate transportation fuels using feedstocks such as lignocellulosic waste materials as a substitute for existing fossil and nuclear fuels. The advantages of lignocellulosics as a feedstock material are that they are abundant, sustainable and carbon-neutral. To improve the economics of producing liquid transportation fuels from lignocellulosic biomass, the development of value-added products from lignin, a major component of lignocellulosics, is necessary. Lignins produced from black liquor through the fractionation of sugarcane bagasse with soda and organic solvents have been characterised by physical, chemical and thermal means. The soda lignin fractions have different physico-chemical and thermal properties from one another. Some of these properties have been compared to bagasse lignin extracted with aqueous ethanol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on lin- ear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and inves- tigate its implications to potential algebraic attacks on the cipher. This is, to our knowledge, the first pa- per that evaluates the security of RC4 against alge- braic attacks through providing a full set of equations that describe the complex word manipulations in the system. For an arbitrary word size, we derive alge- braic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the inter- nal states and keystream of RC4 are then obtained from each component of the cipher based on these al- gebraic representations, and analysed in terms of their contributions to the security of RC4 against algebraic attacks. Interestingly, it is shown that each of the three main operations contained in the components has its own unique algebraic properties, and when their respective equations are combined, the resulting system becomes infeasible to solve. This results in a high level of security being achieved by RC4 against algebraic attacks. On the other hand, the removal of an operation from the cipher could compromise this security. Experiments on reduced versions of RC4 have been performed, which confirms the validity of our algebraic analysis and the conclusion that the full RC4 stream cipher seems to be immune to algebraic attacks at present.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nonlinear filter generators are common components used in the keystream generators for stream ciphers and more recently for authentication mechanisms. They consist of a Linear Feedback Shift Register (LFSR) and a nonlinear Boolean function to mask the linearity of the LFSR output. Properties of the output of a nonlinear filter are not well studied. Anderson noted that the m-tuple output of a nonlinear filter with consecutive taps to the filter function is unevenly distributed. Current designs use taps which are not consecutive. We examine m-tuple outputs from nonlinear filter generators constructed using various LFSRs and Boolean functions for both consecutive and uneven (full positive difference sets where possible) tap positions. The investigation reveals that in both cases, the m-tuple output is not uniform. However, consecutive tap positions result in a more biased distribution than uneven tap positions, with some m-tuples not occurring at all. These biased distributions indicate a potential flaw that could be exploited for cryptanalysis.