999 resultados para Information leak
Resumo:
Rapport de stage présenté à la Faculté des arts et sciences en vue de l'obtention du grade de Maîtrise ès sciences (M. Sc.) en criminologie (option Analyse Criminologique).
Resumo:
Inspired by the recent debate in the financial press, we set out to investigate if financial analysts warn their preferred customers of possible earnings forecast revisions. The issue is explored by monitoring investors’ trading behavior during the weeks prior to analyst earnings forecast revisions, using the unique official stock transactions data set from Finland. In summary, we do not find evidence of large investors systematically being warned of earnings forecast revisions. However, the results indicate that the very largest investors show trading behavior partly consistent with being informed of future earnings forecast revisions.
Resumo:
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.
Resumo:
BACKGROUND: Late trabeculectomy bleb leaks are a common complication after filtering glaucoma surgery. Although asymptomatic, late bleb leaks may lead to hypotony and are associated with bleb related infections.
OBJECTIVES: To assess the effects of interventions for late trabeculectomy bleb leak.
SEARCH METHODS: We searched CENTRAL (which contains the Cochrane Eyes and Vision Group Trials Register) (The Cochrane Library 2012, Issue 7), MEDLINE (January 1946 to July 2012), EMBASE (January 1980 to July 2012), the metaRegister of Controlled Trials (mRCT) (www.controlled-trials.com), ClinicalTrials.gov (www.clinicaltrials.gov) and the WHO International Clinical Trials Registry Platform (ICTRP) (www.who.int/ictrp/search/en). We did not use any date or language restrictions in the electronic searches for trials. We last searched the electronic databases on 18 July 2012.
SELECTION CRITERIA: We included randomised and quasi-randomised trials in which any treatments for eyes with late bleb leak (interventional and non-interventional) were compared with each other.
DATA COLLECTION AND ANALYSIS: Two authors independently assessed trial quality and extracted data. We contacted study authors when additional information was needed.
MAIN RESULTS: The review included one multicentre trial based in the USA with 30 eyes of 30 participants. The trial compared two surgical procedures (conjunctival advancement and amniotic membrane transplant) to cover a filtering bleb leak. Conjunctival advancement has been shown to be more effective in sealing filtering bleb leaks.
AUTHORS' CONCLUSIONS: Although a variety of treatments have been proposed for bleb leaks, there is no evidence of their comparative effectiveness.The evidence in this review was provided by a single trial that compared two surgical procedures (conjunctival advancement and amniotic membrane transplant). The trial did show a superiority of conjunctival advancement, which was regarded as standard treatment, to amniotic membrane transplantation. There is a need for more randomised trials to validate the findings of this single trial and provide more information on the different types of interventions, especially non-surgical treatments compared to surgical procedures. We recommend that any intervention should be compared to a standard procedure, which is to date conjunctival advancement.
Resumo:
On average approximately 13% of the water that is withdrawn by Canadian municipal water suppliers is lost before it reaches final users. This is an important topic for several reasons: water losses cost money, losses force water agencies to draw more water from lakes and streams thereby putting more stress on aquatic ecosystems, leaks reduce system reliability, leaks may contribute to future pipe failures, and leaks may allow contaminants to enter water systems thereby reducing water quality and threatening the health of water users. Some benefits of leak detection fall outside water agencies’ accounting purview (e.g. reduced health risks to households connected to public water supply systems) and, as a result, may not be considered adequately in water agency decision-making. Because of the regulatory environment in which Canadian water agencies operate, some of these benefits-especially those external to the agency or those that may accrue to the agency in future time periods- may not be fully counted when agencies decide on leak detection efforts. Our analysis suggests potential reforms to promote increased efforts for leak detection: adoption of a Canada-wide goal of universal water metering; development of full-cost accounting and, pricing for water supplies; and co-operation amongst the provinces to promulgate standards for leak detection efforts and provide incentives to promote improved efficiency and rational investment decision-making.
Resumo:
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel. ^ This thesis presents new results in the theory of min-entropy leakage. First, we study the perspective of secrecy as a resource that is gradually consumed by a system. We explore this intuition through various models of min-entropy consumption. Next, we consider several composition operators that allow smaller systems to be combined into larger systems, and explore the extent to which the leakage of a combined system is constrained by the leakage of its constituents. Most significantly, we prove upper bounds on the leakage of a cascade of two channels, where the output of the first channel is used as input to the second. In addition, we show how to decompose a channel into a cascade of channels. ^ We also establish fundamental new results about the recently-proposed g-leakage family of measures. These results further highlight the significance of channel cascading. We prove that whenever channel A is composition refined by channel B, that is, whenever A is the cascade of B and R for some channel R, the leakage of A never exceeds that of B, regardless of the prior distribution or leakage measure (Shannon leakage, guessing entropy leakage, min-entropy leakage, or g-leakage). Moreover, we show that composition refinement is a partial order if we quotient away channel structure that is redundant with respect to leakage alone. These results are strengthened by the proof that composition refinement is the only way for one channel to never leak more than another with respect to g-leakage. Therefore, composition refinement robustly answers the question of when a channel is always at least as secure as another from a leakage point of view.^
Resumo:
Developments in information technology will drive the change in records management; however, it should be the health information managers who drive the information management change. The role of health information management will be challenged to use information technology to broker a range of requests for information from a variety of users, including he alth consumers. The purposes of this paper are to conceptualise the role of health information management in the context of a technologically driven and managed health care environment, and to demonstrat e how this framework has been used to review and develop the undergraduate program in health information management at the Queensland University of Technology.