360 resultados para secrets


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kineikonic texts – sites of the moving image – are increasingly prevalent with the rise of digital television, Web 2.0 tools, broadband Internet, and sophisticated mobile technologies. Digital practices are changing the shape of the literacy curriculum, calling for new metalanguages to describe digital and multimodal texts. This paper combines multiliteracies and functional approaches to map conventional and new textual features of a popular kineikonic text – the claymation movie. Enlivened with data from an ethnically diverse, Year 6 classroom, the author outlines filmic conventions to enable teachers and students to analyse and design movies

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter’s interest in fiction’s relationship to truth, lies, and secrecy is not so much a matter of how closely fiction resembles or mirrors the world (its mimetic quality), or what we can learn from fiction (its epistemological value). Rather, the concern is both literary and philosophical: a literary concern that takes into account how texts that thematise secrecy work to withhold and to disclose their secrets as part of the process of narrating and sequencing; and a philosophical concern that considers how survival is contingent on secrets and other forms of concealment such as lies, deception, and half-truths. The texts selected for examination are: Secrets (2002), Skim (2008), and Persepolis: The Story of a Childhood (2003). These texts draw attention to the ways in which the lies and secrets of the female protagonists are part of the intricate mechanism of survival, and demonstrate the ways in which fiction relies upon concealment and revelation as forms of truth-telling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Well over 50 picture books have been published for children on the topic of sexual child abuse (Lampert & Walsh, 2010) many with the aim of teaching their very young readers how to tell the difference between good and bad secrets. This paper looks at three recent picture books for how they focus on disclosure as an end point.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many children learn from a very young age about the importance of always telling the truth. They also learn that telling lies is necessary if they are to survive in a world that paradoxically values the truth but practises deception. Secrets, Lies and Children’s Fiction demonstrates how this paradox is played out in texts for children and young adults, how secrets and lies may be a necessary means for survival and adaptation, and how mendacity may have its virtues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L'intérêt suscité par la ré-ingénierie des processus et les technologies de l'information révèle l'émergence du paradigme du management par les processus. Bien que beaucoup d'études aient été publiées sur des outils et techniques alternatives de modélisation de processus, peu d'attention a été portée à l'évaluation post-hoc des activités de modélisation de processus ou à l'établissement de directives sur la façon de conduire efficacement une modélisation de processus. La présente étude a pour objectif de combler ce manque. Nous présentons les résultats d'une étude de cas détaillée, conduite dans une organisation leader australienne dans le but de construire un modèle de réussite de la modélisation des processus.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The issue of how individual patients and their doctors should act in relation to the knowledge that the patient has a genetic condition— specifically, whether the patient and/or the doctor should or must inform relevant members of the patient’s family—is a looming area of medicolegal controversy. Over the last fifteen years or so, the issue of confidentiality versus disclosure has been particularly controversial in relation to HIV/AIDS patients.1 It has been argued that medical information about genetic disease gives rise to special problems vis-à-vis blood relatives. Because genetic disease is transmitted only by way of procreation, information about genetic disease is unique in that there is a propensity (which is highly variable and depends upon a variety of factors) for the condition to be shared by members of a family who are biologically related. Thus, genetic information about an individual may reveal information about relatives of that individual which is ‘specific (that the person has or will develop a genetic disease); or predictive (that the person has an unspecified risk of developing the disease)’

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WikiLeaks has become a global phenomenon, and its founder and spokesman Julian Assange an international celebrity (or terrorist, depending on one’s perspective). But perhaps this focus on Assange and his website is as misplaced as the attacks against Napster and its founders were a decade ago: WikiLeaks itself only marks a new phase in a continuing shift in the balance of power between states and citizens, much as Napster helped to undermine the control of major music labels over the music industry. If the history of music filesharing is any guide, no level of punitive action against WikiLeaks and its supporters is going to re-contain the information WikiLeaks has set loose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WikiLeaks has become a global phenomenon, and its founder and spokesman Julian Assange an international celebrity (or terrorist, depending on one’s perspective). But perhaps this focus on Assange and his website is as misplaced as the attacks against Napster and its founders were a decade ago: WikiLeaks itself only marks a new phase in a continuing shift in the balance of power between states and citizens, much as Napster helped to undermine the control of major music labels over the music industry. If the history of music filesharing is any guide, no level of punitive action against WikiLeaks and its supporters is going to re-contain the information WikiLeaks has set loose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secrets & Lies is an Australian drama television series that first screened on Network Ten on 3 March 2014. The series has aired in the Republic of Ireland on RTÉ TWO HD from 30 March, 2014 at 9.30pm. The series also debuted in Canada on the CBC in July 2014. It premiered in The Netherlands on RTL on 24 August 2014. Started in the UK on 23 September 2014 on Channel 5 and in France from January the 26 to February the 2 on France2. On 4 February 2014, the production company behind this version announced that a US version with the same title was in the works for ABC and would be co-produced with ABC Studios with a series penalty if the project is held back or not greenlighted by the network. The series premiered in the U.S. on 1 March 2015. Ryan Phillippe and Juliette Lewis stars in this adaptation. The series follows the story of a family man who finds the body of a young boy and quickly becomes the prime murder suspect. He has no choice but to try to find the real killer as his marriage, his kids, his reputation and his sanity are all at stake.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Leaked Trans-Pacific Partnership documents show the US is pushing for unprecedented penalties for those (like journalists) who expose trade secrets. Will Australia go along with the proposal?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces the notion of half-truths, a term used to describe the communication of technically truthful information that has been, or has the potential to be, undermined by the omission of key information. By using an illustrative, exemplar case this study shows how an organization’s transparency and credibility in relation to its corporate social responsibility communication can be undermined, despite presenting technically truthful information

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.