353,975 research outputs found
Securing Humanitarian Information Exchange: A Mediator-Wrapper Architecture
Reliable and secure information exchange, which is crucial for successful response to crisis by humanitarian organizations, requires the responding groups to swiftly organize themselves in new and dynamic ways. Within these resulting impromptu structures, planning, negotiation, and coordination poses significant problems, due to the heterogeneity of the technologies in place. A plethora of technical solutions have been proposed to solve information exchange issues. However, they thought of security as an ad-hoc, especially authentication, authorization, and access control. This paper proposes a conceptual platform, the Secured Humanitarian Information Sharing Architecture (SHISA), that enables heterogeneous humanitarian systems to exchange information while considering authentication, authorization, and access control. SHISA standardizes communication through the exchange of encrypted XML documents. It uses the Privilege Management Infrastructure (PMI) for authentication and authorization. The platform utilizes the mechanisms of indexing and impersonation to control data access so that humanitarian organizations\u27 users access only the information they need
Exclusion-intersection encryption
Identity-based encryption (IBE) has shown to be a useful cryptographic scheme enabling secure yet flexible role-based access control. We propose a new variant of IBE named as exclusion-intersection encryption: during encryption, the sender can specify the targeted groups that are legitimate and interested in reading the documents; there exists a trusted key generation centre generating the intersection private decryption keys on request. This special private key can only be used to decrypt the ciphertext which is of all the specified groups' interests, its holders are excluded from decrypting when the documents are not targeted to all these groups (e.g., the ciphertext of only a single group's interest). While recent advances in cryptographic techniques (e.g., attribute-based encryption or wicked IBE) can support a more general access control policy, the private key size may be as long as the number of attributes or identifiers that can be specified in a ciphertext, which is undesirable, especially when each user may receive a number of such keys for different decryption power. One of the applications of our notion is to support an ad-hoc joint project of two or more groups which needs extra helpers that are not from any particular group. © 2011 IEEE.published_or_final_versionThe 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-1053The 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-105
The MĂĽller-Lyer illusion through mental imagery
Previous studies have pointed to a link between visual perception and mental imagery. The present experiment focuses on
one of the best-known illusions, the MĂĽller-Lyer illusion, now reproduced under conditions of real perception and by means
of imagery. To that purpose, a tailored ad-hoc set of combined figures was presented to a total of 161 fine art students (M
age = 20,34, SD = 1,75) who individually worked with two different variations of the MĂĽller-Lyer figures which consisted
of a 10 mm long shaft and two fins set at an angle of 30Âş, being 15 mm long in one instance and 45 mm long in the other. In
small groups, participants also completed an image control questionnaire. Results yielded that the longer the oblique lines,
the larger the magnitude of the illusion both in the situation of real perception and in the imaginary situation. Also, the
magnitude of the illusion augmented in the situation of perception in contrast to the imaginary situation, both with 15 mm
long fins and with those of 45 mm. However, no significant differences were found in the magnitude of the illusion between
high and low individuals in image control, although interactions between image control and other variables were indeed
significant. The consistency of the outcome is a step forward in the study of illusions through mental images and opens the
door to new lines of research that could involve innovative methods of analysis, different versions of the illusion and wider
groups of participantsOpen Access funding provided thanks to the CRUECSIC
(Universidade de Vigo/CISUG) agreement with Springer NatureS
Language Barriers in Health Care Settings: An Annotated Bibliography of Research Literature
Provides an overview of resources related to the prevalence, role, and effects of language barriers and access in health care
Feeding and metabolic consequences of scheduled consumption of large, binge-type meals of high fat diet in the Sprague–Dawley rat
Peer reviewedPublisher PD
- …