945 resultados para Full Hiding


Relevância:

60.00% 60.00%

Publicador:

Resumo:

We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate encryption setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We formalize the notion of attribute hiding in the presence of revocation and propose an RPE scheme, called AH-RPE, which achieves attribute-hiding under the Decision Linear assumption in the standard model. We then present a stronger privacy notion, termed full hiding, which further cares about privacy of revoked users. We propose another RPE scheme, called FH-RPE, that adopts the Subset Cover Framework and offers full hiding under the Decision Linear assumption in the standard model. The scheme offers very flexible privacy-preserving access control to encrypted data and can be used in sender-local revocation scenarios.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores full-time workers' understanding of and assumptions about part-time work against six job quality components identified in recent literature. Forty interviews were conducted with employees in a public sector agency in Australia, a study context where part-time work is ostensibly 'good quality' and is typically long term, voluntary, involving secure contracts (i.e. permanent rather than casual) and having predictable hours distributed evenly over the week and year. Despite strong collective bargaining arrangements as well as substantial legal and industrial obligations, the findings revealed some serious concerns for part-time job quality. These concerns included reduced responsibilities and lesser access to high status roles and projects, a lack of access to promotion opportunities, increased work intensity and poor workplace support. The highly gendered, part-time labour market also means that it is women who disproportionately experience this disadvantage. To foster equity, greater attention needs to focus on monitoring and enhancing job quality, regardless of hours worked.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cold-formed steel members can be assembled in various combinations to provide cost-efficient and safe light gauge floor systems for buildings. Such Light gauge Steel Framing (LSF) systems are widely accepted in industrial and commercial building construction. An example application is in floor-ceiling systems. Light gauge steel floor-ceiling systems must be designed to serve as fire compartment boundaries and provide adequate fire resistance. Fire-rated floor-ceiling assemblies formed with new materials and construction methodologies have been increasingly used in buildings. However, limited research has been undertaken in the past and hence a thorough understanding of their fire resistance behaviour is not available. Recently a new composite floor-ceiling system has been developed to provide higher fire rating under standard fire conditions. But its increased fire rating could not be determined using the currently available design methods. Therefore a research project was carried out to investigate its structural and fire resistance behaviour under standard fire conditions. In this research project full scale experimental tests of the new LSF floor system based on a composite ceiling unit were undertaken using a gas furnace at the Queensland University of Technology. Both the conventional and the new steel floor-ceiling systems were tested under structural and fire loads. Full scale fire tests provided a good understanding of the fire behaviour of the LSF floor-ceiling systems and confirmed the superior performance of the new composite system. This paper presents the details of this research into the structural and fire behaviour of light gauge steel floor systems protected by the new composite panel, and the results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the place of the creative sector -- the arts, design, media and communications -- within the framework of contemporary innovation. The historical focus on science-and-technology by innovation policy makers has spurred many within the creative sector to argue how and why it also contributes to innovation. Drawing on a wide range of English-speaking research and policy documents, the full gamut of places for the creative sector in innovation is surveyed. The paper ends by scoping out the conceptual and empirical research that is required if ideas about innovation in the creative sector are to take up a mature position within innovation studies and related policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The technological environment in which contemporary small and medium-sized enterprises (SMEs) operate can only be described as dynamic. The exponential rate of technological change, characterised by perceived increases in the benefits associated with various technologies, shortening product life cycles and changing standards, provides for the SME a complex and challenging operational context. The primary aim of this research was to concentrate on those SMEs that had already adopted technology in order to identify their needs for the new mobile data technologies (MDT), the mobile Internet. The research design utilised a mixed approach whereby both qualitative and quantitative data was collected to address the question. Overall, the needs of these SMEs for MDT can be conceptualised into three areas where the technology will assist business practices; communication, eCommerce and security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of operations in Fpk dominates the complexity of the operations that occur in the lower degree subfields. Consequently, full extension field operations have the greatest effect on the runtime of Miller’s algorithm. Many recent optimizations in the literature have focussed on improving the overall operation count by presenting new explicit formulas that reduce the number of subfield operations encountered throughout an iteration of Miller’s algorithm. Unfortunately, almost all of these improvements tend to suffer for larger embedding degrees where the expensive extension field operations far outweigh the operations in the smaller subfields. In this paper, we propose a new way of carrying out Miller’s algorithm that involves new explicit formulas which reduce the number of full extension field operations that occur in an iteration of the Miller loop, resulting in significant speed ups in most practical situations of between 5 and 30 percent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Agriculture's contribution to radiative forcing is principally through its historical release of carbon in soil and vegetation to the atmosphere and through its contemporary release of nitrous oxide (N2O) and methane (CHM4). The sequestration of soil carbon in soils now depleted in soil organic matter is a well-known strategy for mitigating the buildup of CO2 in the atmosphere. Less well-recognized are other mitigation potentials. A full-cost accounting of the effects of agriculture on greenhouse gas emissions is necessary to quantify the relative importance of all mitigation options. Such an analysis shows nitrogen fertilizer, agricultural liming, fuel use, N2O emissions, and CH4 fluxes to have additional significant potential for mitigation. By evaluating all sources in terms of their global warming potential it becomes possible to directly evaluate greenhouse policy options for agriculture. A comparison of temperate and tropical systems illustrates some of these options.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many fashion businesses in New Zealand have followed a global trend towards inexpensive off shore manufacturing. The transfer of the production of garments to overseas workers has had consequences for the wellbeing of local businesses, fashion designers and garment makers. The gradual decline of fashion manufacturing also appears to have resulted in a local fashion scene where many garments look the same in style, colour, fabric, cut and fit. The excitement of the past, where the majority of fashion designers established their own individuality through the cut and shape of the garments that they produced, may have been inadvertently lost in an effort to take advantage of cost savings achieved through mass production and manufacturing methods which are now largely unavailable in New Zealand. Consequently, a sustainable local fashion and manufacturing industry, with design integrity, seems further out of reach. This paper is focussed upon the thesis that the design and manufacture of a fashion garment, bearing in mind certain economic and practical restrictions at its inception, can contribute to a more sustainable fashion manufacturing industry in New Zealand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This exhibition engages with one of the key issues facing the fashion textiles industry in terms of future sustainability: that of the well being of fashion industry workers in Australia and New Zealand (people). This collection formed the basis of my honours dissertation (completed in New Zealand in 2008) which examines the contribution that design can make to sustainable manufacturing; particularly design for local production and consumption. An important aspect this work is the discussion of source, the work suggests that the made in China syndrome (in reference to the current state of over-consumerism in Australia and New Zealand) could be bought to a close through design to minimize waste and maximize opportunity for ‘people’: in this case both garment workers and the SMEs that employ them. The garments reflect the possibilities of focusing on a local approach that could be put into practice by a framework of SMEs that already exist. In addition the design process is highly transferrable and could be put into practice almost anywhere with minimal set up costs and a design ethos that progresses at the same pace as the skills of workers. This collection is a physical and conceptual embodiment of a source local/make local/sell local approach. The collection is an example of design that demonstrates that this is not an unrealistic ideal and is in fact possible through the development of a sustainable industry, in the sense of people, profit and planet, through adoption of a design process model that stops the waste at the source, by making better use of the raw materials and labour involved in making fashion garments. Although the focus of this research appears to centre on people and profit, this kind of source local/make local/sell local approach also has great benefits in terms of environmental sustainability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We demonstrate a modification of the algorithm of Dani et al for the online linear optimization problem in the bandit setting, which allows us to achieve an O( \sqrt{T ln T} ) regret bound in high probability against an adaptive adversary, as opposed to the in expectation result against an oblivious adversary of Dani et al. We obtain the same dependence on the dimension as that exhibited by Dani et al. The results of this paper rest firmly on those of Dani et al and the remarkable technique of Auer et al for obtaining high-probability bounds via optimistic estimates. This paper answers an open question: it eliminates the gap between the high-probability bounds obtained in the full-information vs bandit settings.