934 resultados para Object-Specific Authorization Protocol
Resumo:
Analyzing security protocols is an ongoing research in the last years. Different types of tools are developed to make the analysis process more precise, fast and easy. These tools consider security protocols as black boxes that can not easily be composed. It is difficult or impossible to do a low-level analysis or combine different tools with each other using these tools. This research uses Coloured Petri Nets (CPN) to analyze OSAP trusted computing protocol. The OSAP protocol is modeled in different levels and it is analyzed using state space method. The produced model can be combined with other trusted computing protocols in future works.
Resumo:
The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
Thatcher, Rhys, and Alan Batterham, 'Development and validation of a sport-specific exercise protocol for elite youth soccer players', Journal of Sports Medicine and Physical Fitness, (2004) 44(1) pp.15-22 RAE2008
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
OBJECTIVES: A number of complications exist with invasive mechanical ventilation and with the use of and withdrawal from prolonged ventilator support. The use of protocols that enable the systematic identification of patients eligible for an interruption in mechanical ventilation can significantly reduce the number of complications. This study describes the application of a weaning protocol and its results. METHODS: Patients who required invasive mechanical ventilation for more than 24 hours were included and assessed daily to identify individuals who were ready to begin the weaning process. RESULTS: We studied 252 patients with a median mechanical ventilation time of 3.7 days (interquartile range of 1 to 23 days), a rapid shallow breathing index value of 48 (median), a maximum inspiratory pressure of 40 cmH2O, and a maximum expiratory pressure of 40 cm H2O (median). Of these 252 patients, 32 (12.7%) had to be reintubated, which represented weaning failure. Noninvasive ventilation was used postextubation in 170 (73%) patients, and 15% of these patients were reintubated, which also represented weaning failure. The mortality rate of the 252 patients studied was 8.73% (22), and there was no significant difference in the age, gender, mechanical ventilation time, and maximum inspiratory pressure between the survivors and nonsurvivors. CONCLUSIONS: The use of a specific weaning protocol resulted in a lower mechanical ventilation time and an acceptable reintubation rate. This protocol can be used as a comparative index in hospitals to improve the weaning system, its monitoring and the informative reporting of patient outcomes and may represent a future tool and source of quality markers for patient care.
Resumo:
Our ability to track an object as the same persisting entity over time and motion may primarily rely on spatiotemporal representations which encode some, but not all, of an object's features. Previous researchers using the 'object reviewing' paradigm have demonstrated that such representations can store featural information of well-learned stimuli such as letters and words at a highly abstract level. However, it is unknown whether these representations can also store purely episodic information (i.e. information obtained from a single, novel encounter) that does not correspond to pre-existing type-representations in long-term memory. Here, in an object-reviewing experiment with novel face images as stimuli, observers still produced reliable object-specific preview benefits in dynamic displays: a preview of a novel face on a specific object speeded the recognition of that particular face at a later point when it appeared again on the same object compared to when it reappeared on a different object (beyond display-wide priming), even when all objects moved to new positions in the intervening delay. This case study demonstrates that the mid-level visual representations which keep track of persisting identity over time--e.g. 'object files', in one popular framework can store not only abstract types from long-term memory, but also specific tokens from online visual experience.
Resumo:
Humans like some colours and dislike others, but which particular colours and why remains to be understood. Empirical studies on colour preferences generally targeted most preferred colours, but rarely least preferred (disliked) colours. In addition, findings are often based on general colour preferences leaving open the question whether results generalise to specific objects. Here, 88 participants selected the colours they preferred most and least for three context conditions (general, interior walls, t-shirt) using a high-precision colour picker. Participants also indicated whether they associated their colour choice to a valenced object or concept. The chosen colours varied widely between individuals and contexts and so did the reasons for their choices. Consistent patterns also emerged, as most preferred colours in general were more chromatic, while for walls they were lighter and for t-shirts they were darker and less chromatic compared to least preferred colours. This meant that general colour preferences could not explain object specific colour preferences. Measures of the selection process further revealed that, compared to most preferred colours, least preferred colours were chosen more quickly and were less often linked to valenced objects or concepts. The high intra- and inter-individual variability in this and previous reports furthers our understanding that colour preferences are determined by subjective experiences and that most and least preferred colours are not processed equally.
Resumo:
To assess the influence of anatomic location on the relationship between computed tomography (CT) number and X-ray attenuation in limited and medium field-of-view (FOV) scans. Materials and Methods Tubes containing solutions with different concentrations of K2HPO4 were placed in the tooth sockets of a human head phantom. Cone-beam computed tomography (CBCT) scans were acquired, and CT numbers of the K2HPO4 solutions were measured. The relationship between CT number and K2HPO4 concentration was examined by linear regression analyses. Then, the variation in CT number according to anatomic location was examined. Results The relationship between K2HPO4 concentration and CT number was strongly linear. The slopes of the linear regressions for the limited FOVs were almost 2-fold lower than those for the medium FOVs. The absolute CT number differed between imaging protocols and anatomic locations. Conclusion There is a strong linear relationship between X-ray attenuation and CT number. The specific imaging protocol and anatomic location of the object strongly influence this relationship.
Resumo:
Background Malnutrition and unintentional weight loss are major clinical issues in people with dementia living in residential aged care facilities (RACFs) and are associated with serious adverse outcomes. However, evidence regarding effective interventions is limited and strategies to improve the nutritional status of this population are required. This presentation describes the implementation and results of a pilot randomised controlled trial of a multi-component intervention for improving the nutritional status of RACF residents with dementia. Method Fifteen residents with moderate-severe dementia living in a secure long-term RACF participated in a five week pilot study. Participants were randomly allocated to either an Intervention (n=8) or Control group (n=7). The intervention comprised four elements delivered in a separate dining room at lunch and dinner: the systematic reinforcement of residents’ eating behaviors using a specific communication protocol; family-style dining; high ambiance table presentation; and routine Dietary-Nutrition Champion supervision. Control group participants ate their meals according to the facility’s standard practice. Baseline and follow-up assessments of nutritional status, food consumption, and body mass index were obtained by qualified nutritionists. Additional assessments included measures of cognitive functioning, mealtime agitation, depression, wandering status and multiple measures of intervention fidelity. Results No participant was malnourished at study commencement and participants in both groups gained weight from follow-up to baseline which was not significantly different between groups (t=0.43; p=0.67). A high degree of treatment fidelity was evident throughout the intervention. Qualitative data from staff indicate the intervention was perceived to be beneficial for residents. Conclusions This multi-component nutritional intervention was well received and was feasible in the RACF setting. Participants’ sound nutritional status at baseline likely accounts for the lack of an intervention effect. Further research using this protocol in malnourished residents is recommended. For success, a collaborative approach between researchers and facility staff, particularly dietary staff, is essential.
Resumo:
Overlay networks have been used for adding and enhancing functionality to the end-users without requiring modifications in the Internet core mechanisms. Overlay networks have been used for a variety of popular applications including routing, file sharing, content distribution, and server deployment. Previous work has focused on devising practical neighbor selection heuristics under the assumption that users conform to a specific wiring protocol. This is not a valid assumption in highly decentralized systems like overlay networks. Overlay users may act selfishly and deviate from the default wiring protocols by utilizing knowledge they have about the network when selecting neighbors to improve the performance they receive from the overlay. This thesis goes against the conventional thinking that overlay users conform to a specific protocol. The contributions of this thesis are threefold. It provides a systematic evaluation of the design space of selfish neighbor selection strategies in real overlays, evaluates the performance of overlay networks that consist of users that select their neighbors selfishly, and examines the implications of selfish neighbor and server selection to overlay protocol design and service provisioning respectively. This thesis develops a game-theoretic framework that provides a unified approach to modeling Selfish Neighbor Selection (SNS) wiring procedures on behalf of selfish users. The model is general, and takes into consideration costs reflecting network latency and user preference profiles, the inherent directionality in overlay maintenance protocols, and connectivity constraints imposed on the system designer. Within this framework the notion of user’s "best response" wiring strategy is formalized as a k-median problem on asymmetric distance and is used to obtain overlay structures in which no node can re-wire to improve the performance it receives from the overlay. Evaluation results presented in this thesis indicate that selfish users can reap substantial performance benefits when connecting to overlay networks composed of non-selfish users. In addition, in overlays that are dominated by selfish users, the resulting stable wirings are optimized to such great extent that even non-selfish newcomers can extract near-optimal performance through naïve wiring strategies. To capitalize on the performance advantages of optimal neighbor selection strategies and the emergent global wirings that result, this thesis presents EGOIST: an SNS-inspired overlay network creation and maintenance routing system. Through an extensive measurement study on the deployed prototype, results presented in this thesis show that EGOIST’s neighbor selection primitives outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, these results demonstrate that EGOIST is competitive with an optimal but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overheads. This thesis also studies selfish neighbor selection strategies for swarming applications. The main focus is on n-way broadcast applications where each of n overlay user wants to push its own distinct file to all other destinations as well as download their respective data files. Results presented in this thesis demonstrate that the performance of our swarming protocol for n-way broadcast on top of overlays of selfish users is far superior than the performance on top of existing overlays. In the context of service provisioning, this thesis examines the use of distributed approaches that enable a provider to determine the number and location of servers for optimal delivery of content or services to its selfish end-users. To leverage recent advances in virtualization technologies, this thesis develops and evaluates a distributed protocol to migrate servers based on end-users demand and only on local topological knowledge. Results under a range of network topologies and workloads suggest that the performance of the distributed deployment is comparable to that of the optimal but unscalable centralized deployment.
Resumo:
Rapid in situ diagnosis of damage is a key issue in the preservation of stone-built cultural heritage. This is evident in the increasing number of congresses, workshops and publications dealing with this issue. With this increased activity has come, however, the realisation that for many culturally significant artefacts it is not possible either to remove samples for analysis or to affix surface markers for measurement. It is for this reason that there has been a growth of interest in non-destructive and minimally invasive techniques for characterising internal and external stone condition. With this interest has come the realisation that no single technique can adequately encompass the wide variety of parameters to be assessed or provide the range of information required to identify appropriate conservation. In this paper we describe a strategy to address these problems through the development of an integrated `tool kit' of measurement and analytical techniques aimed specifically at linking object-specific research to appropriate intervention. The strategy is based initially upon the acquisition of accurate three-dimensional models of stone-built heritage at different scales using a combination of millimetre accurate LiDAR and sub-millimetre accurate Object Scanning that can be exported into a GIS or directly into CAD. These are currently used to overlay information on stone characteristics obtained through a combination of Ground Penetrating Radar, Surface Permeametry, Colorimetry and X-ray Fluorescence, but the possibility exists for adding to this array of techniques as appropriate. In addition to the integrated three-dimensional data array provided by superimposition upon Digital Terrain Models, there is the capability of accurate re-measurement to show patterns of surface loss and changes in material condition over time. Thus it is possible to both record and base-line condition and to identify areas that require either preventive maintenance or more significant pre-emptive intervention. In pursuit of these goals the authors are developing, through a UK Government supported collaboration between University Researchers and Conservation Architects, commercially viable protocols for damage diagnosis, condition monitoring and eventually mechanisms for prioritizing repairs to stone-built heritage. The understanding is, however, that such strategies are not age-constrained and can ultimately be applied to structures of any age.
Resumo:
Objective. To present an overview of the literature about the efficacy of neuromuscular electrical stimulation (NMES) in the rehabilitation of neurogenic oropharyngeal dysphagia and to compare methods of therapy in stroke. Method. An extensive bibliographic survey of several databases (Medline, Scielo Brazil, Chile and Spain and Lilacs) was performed using the following keywords: deglutition disorders, therapy, electrical stimulation, pharynx and stroke between 1990 and 2011. Results. The articles reported the use of NMES in heterogeneous population; there is no consensus thus far about the method used during the NMES and about its rehabilitation efficacy in neurogenic oropharyngeal dysphagia. Conclusions. After this study, we concluded that further investigations are necessary with homogeneous groups of patients with neurogenic dysphagia, discussing the proposition of a specific NMES protocol for the rehabilitation of neurogenic oropharyngeal dysphagia.
Resumo:
The aim of this study was to investigate the effect of fatigue induced by an exhaustive laboratory-based soccer-specific exercise on different hamstrings/quadriceps (H:Q) ratios of soccer players. Twenty-two male professional soccer players (23·1 ± 3·4 year) performed maximal eccentric (ecc) and concentric (con) contractions for knee extensors (KE) and flexors (KF) at 60° s-1 and 180° s-1 to assess conventional (Hcon:Qcon) and functional (Hecc:Qcon) ratios. Additionally, they performed maximal voluntary isometric contraction for KE and KF, from which the maximal muscle strength, rate of force development (RFD) and RFD H:Q strength ratio (RFDH:Q) were extracted. Thereafter, subjects were performed an exhaustive laboratory-based soccer-specific exercise and a posttest similar to the pretest. There was significant reduction in Hcon:Qcon (0·60 ± 0·06 versus 0·58 ± 0·06, P<0·05) and in Hecc:Qcon (1·29 ± 0·2 versus 1·16 ± 0·2, P<0·01) after the soccer-specific exercise. However, no significant difference between Pre and Post exercise conditions was found for RFDH:Q at 0-50 (0·53 ± 0·23 versus 0·57 ± 0·24, P>0·05) and 0-100 ms (0·53 ± 0·17 versus 0·55 ± 0·17, P>0·05). In conclusion, H:Q strength ratios based on peak force values are more affected by fatigue than RFDH:Q obtained during early contraction phase. Thus, fatigue induced by soccer-specific intermittent protocol seems not reduce the potential for knee joint stabilization during the initial phase of voluntary muscle contraction. copy; 2012 Scandinavian Society of Clinical Physiology and Nuclear Medicine.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)