978 resultados para Human protocol


Relevância:

70.00% 70.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The human right to water has recently been recognised by both the United Nations General Assembly and the Human Rights Council. As the mining industry interacts with water on multiple levels, it is important that these interactions respect the human right to water. Currently, a disconnect exists between mine site water management practices and the recognition of water from a human rights perspective. The Minerals Council of Australia (MCA) Water Accounting Framework (WAF) has previously been used to strengthen the connection between water management and human rights. This article extends this connection through the use of a Social Water Assessment Protocol (SWAP). The SWAP is scoping tool consisting of a set of questions classified into taxonomic themes under leading topics with suggested sources of data that enable mine sites to better understand the local water context in which they operate. Three of the themes contained in the SWAP – gender, Indigenous peoples and health – are discussed to demonstrate how the protocol may be useful in assisting mining companies to consider their impacts on the human right to water.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background/Aim. Mesenchymal stromal cells (MSCs) have been utilised in many clinical trials as an experimental treatment in numerous clinical settings. Bone marrow remains the traditional source tissue for MSCs but is relatively hard to access in large volumes. Alternatively, MSCs may be derived from other tissues including the placenta and adipose tissue. In an initial study no obvious differences in parameters such as cell surface phenotype, chemokine receptor display, mesodermal differentiation capacity or immunosuppressive ability, were detected when we compared human marrow derived- MSCs to human placenta-derived MSCs. The aim of this study was to establish and evaluate a protocol and related processes for preparation placenta-derived MSCs for early phase clinical trials. Methods. A full-term placenta was taken after delivery of the baby as a source of MSCs. Isolation, seeding, incubation, cryopreservation of human placentaderived MSCs and used production release criteria were in accordance with the complex regulatory requirements applicable to Code of Good Manufacturing Practice manufacturing of ex vivo expanded cells. Results. We established and evaluated instructions for MSCs preparation protocol and gave an overview of the three clinical areas application. In the first trial, MSCs were co-transplanted iv to patient receiving an allogeneic cord blood transplant as therapy for treatmentrefractory acute myeloid leukemia. In the second trial, MSCs were administered iv in the treatment of idiopathic pulmonary fibrosis and without serious adverse effects. In the third trial, MSCs were injected directly into the site of tendon damage using ultrasound guidance in the treatment of chronic refractory tendinopathy. Conclusion. Clinical trials using both allogeneic and autologous cells demonstrated MSCs to be safe. A described protocol for human placenta-derived MSCs is appropriate for use in a clinical setting, relatively inexpensive and can be relatively easily adjusted to a different set of regulatory requirements, as applicable to early phase clinical trials.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Human associated delay-tolerant network (HDTN) is a new delay-tolerant network where mobile devices are associated with humans. It can be viewed from both their geographic and social dimensions. The combination of these different dimensions can enable us to more accurately comprehend a delay-tolerant network and consequently use this multi-dimensional information to improve overall network efficiency. Alongside the geographic dimension of the network which is concerned with geographic topology of routing, social dimensions such as social hierarchy can be used to guide the routing message to improve not only the routing efficiency for individual nodes, but also efficiency for the entire network.

We propose a multi-dimensional routing protocol (M-Dimension) for the human associated delay-tolerant network which uses the local information derived from multiple dimensions to identify a mobile node more accurately. Each dimension has a weight factor and is organized by the Distance Function to select an intermediary and applies multi-cast routing. We compare M-Dimension to existing benchmark routing protocols using the MIT Reality Dataset, a well-known benchmark dataset based on a human associated mobile network trace file. The results of our simulations show that M-Dimension has a significant increase in the average success ratio and is very competitive when End-to-End Delay of packet delivery is used in comparison to other multi-cast DTN routing protocols.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

BACKGROUND: The National Human Papillomavirus (HPV) Vaccination Program in Australia commenced in 2007 for females and in 2013 for males, using the quadrivalent HPV vaccine (HPV 6,11,16,18). Thus far, we have demonstrated very substantial reductions in genital warts and in the prevalence of HPV among young Australian women, providing early evidence for the success of this public health initiative. Australia has a long history of school-based vaccination programs for adolescents, with comparatively high coverage. However, it is not clear what factors promote success in a school vaccination program. The HPV.edu study aims to examine: 1) student knowledge about HPV vaccination; 2) psycho-social outcomes and 3) vaccination uptake.

METHODS/DESIGN: HPV.edu is a cluster randomised trial of a complex intervention in schools aiming to recruit 40 schools with year-8 enrolments above 100 students (approximately 4400 students). The schools will be stratified by Government, Catholic, and Independent sectors and geographical location, with up to 20 schools recruited in each of two states, Western Australia (WA) and South Australia (SA), and randomly allocated to intervention or control (usual practice). Intervention schools will receive the complex intervention which includes an adolescent intervention (education and distraction); a decisional support tool for parents and adolescents and logistical strategies (consent form returns strategies, in-school mop-up vaccination and vaccination-day guidelines). Careful process evaluation including an embedded qualitative evaluation will be undertaken to explore in depth possible mechanisms for any observed effect of the intervention on primary and secondary outcomes.

DISCUSSION: This study is the first to evaluate the relative effectiveness of various strategies to promote best practice in school-based vaccination against HPV. The study aims to improve vaccination-related psychosocial outcomes, including adolescent knowledge and attitudes, decision-making involvement, self-efficacy, and to reduce fear and anxiety. The study also aims to improve school vaccination program logistics including reduction in time spent vaccinating adolescents and increased number of consent forms returned (regardless of decision). Less anxiety in adolescents will likely promote more efficient vaccination, which will be more acceptable to teachers, nurses and parents. Through these interventions, it is hoped that vaccination uptake will be increased.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The human buccal micronucleus cytome assay (BMCyt) is one of the most widely used techniques to measure genetic damage in human population studies. Reducing protocol variability, assessing the role of confounders, and estimating a range of reference values are research priorities that will be addressed by the HUMNXL, collaborative study. The HUMNXL, project evaluates the impact of host factors, occupation, life-style, disease status, and protocol features on the occurrence of MN in exfoliated buccal cells. In addition, the study will provide a range of reference values for all cytome endpoints. A database of 5424 subjects with buccal MN values obtained from 30 laboratories worldwide was compiled and analyzed to investigate the influence of several conditions affecting MN frequency. Random effects models were mostly used to investigate MN predictors. The estimated spontaneous MN frequency was 0.74 parts per thousand (95% CI 0.52-1.05). Only staining among technical features influenced MN frequency, with an abnormal increase for non-DNA-specific stains. No effect of gender was evident, while the trend for age was highly significant (p < 0.001). Most occupational exposures and a diagnosis of cancer significantly increased MN and other endpoints frequencies. MN frequency increased in heavy smoking (>= 40 cig/day. FR = 1.37:95% CI 1.03-.82) and decreased with daily fruit consumption (FR = 0.68; 95% CI 0.50-0.91). The results of the HUMNXL, project identified priorities for validation studies, increased the basic knowledge of the assay, and contributed to the creation of a laboratory network which in perspective may allow the evaluation of disease risk associated with MN frequency. (C) 2011 Elsevier B.V. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

PURPOSE. To better understand the relative contributions of rod, cone, and melanopsin to the human pupillary light reflex (PLR) and to determine the optimal conditions for assessing the health of the rod, cone, and melanopsin pathways with a relatively brief clinical protocol. METHODS. PLR was measured with an eye tracker, and stimuli were controlled with a Ganzfeld system. In experiment 1, 2.5 log cd/m(2) red (640 +/- 10 nm) and blue (467 +/- 17 nm) stimuli of various durations were presented after dark adaptation. In experiments 2 and 3, 1-second red and blue stimuli were presented at different intensity levels in the dark (experiment 2) or on a 0.78 log cd/m(2) blue background (experiment 3). Based on the results of experiments 1 to 3, a clinical protocol was designed and tested on healthy control subjects and patients with retinitis pigmentosa and Leber`s congenital amaurosis. RESULTS. The duration for producing the optimal melanopsin-driven sustained pupil response after termination of an intense blue stimulus was 1 second. PLR rod-and melanopsin-driven components are best studied with low-and high-intensity flashes, respectively, presented in the dark (experiment 2). A blue background suppressed rod and melanopsin responses, making it easy to assess the cone contribution with a red flash (experiment 3). With the clinical protocol, robust melanopsin responses could be seen in patients with few or no contributions from the rods and cones. CONCLUSIONS. It is possible to assess the rod, cone, and melanopsin contributions to the PLR with blue flashes at two or three intensity levels in the dark and one red flash on a blue background. (Invest Ophthalmol Vis Sci. 2011; 52: 6624-6635) DOI: 10.1167/iovs.11-7586