353,975 research outputs found

    Securing Humanitarian Information Exchange: A Mediator-Wrapper Architecture

    Get PDF
    Reliable and secure information exchange, which is crucial for successful response to crisis by humanitarian organizations, requires the responding groups to swiftly organize themselves in new and dynamic ways. Within these resulting impromptu structures, planning, negotiation, and coordination poses significant problems, due to the heterogeneity of the technologies in place. A plethora of technical solutions have been proposed to solve information exchange issues. However, they thought of security as an ad-hoc, especially authentication, authorization, and access control. This paper proposes a conceptual platform, the Secured Humanitarian Information Sharing Architecture (SHISA), that enables heterogeneous humanitarian systems to exchange information while considering authentication, authorization, and access control. SHISA standardizes communication through the exchange of encrypted XML documents. It uses the Privilege Management Infrastructure (PMI) for authentication and authorization. The platform utilizes the mechanisms of indexing and impersonation to control data access so that humanitarian organizations\u27 users access only the information they need

    Exclusion-intersection encryption

    Get PDF
    Identity-based encryption (IBE) has shown to be a useful cryptographic scheme enabling secure yet flexible role-based access control. We propose a new variant of IBE named as exclusion-intersection encryption: during encryption, the sender can specify the targeted groups that are legitimate and interested in reading the documents; there exists a trusted key generation centre generating the intersection private decryption keys on request. This special private key can only be used to decrypt the ciphertext which is of all the specified groups' interests, its holders are excluded from decrypting when the documents are not targeted to all these groups (e.g., the ciphertext of only a single group's interest). While recent advances in cryptographic techniques (e.g., attribute-based encryption or wicked IBE) can support a more general access control policy, the private key size may be as long as the number of attributes or identifiers that can be specified in a ciphertext, which is undesirable, especially when each user may receive a number of such keys for different decryption power. One of the applications of our notion is to support an ad-hoc joint project of two or more groups which needs extra helpers that are not from any particular group. © 2011 IEEE.published_or_final_versionThe 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-1053The 1st IEEE International Workshop on Security in Computers, Networking and Communications (SCNC 2011) in conjuntion with IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings of INFOCOM WKSHPS, 2011, p. 1048-105

    The MĂĽller-Lyer illusion through mental imagery

    Get PDF
    Previous studies have pointed to a link between visual perception and mental imagery. The present experiment focuses on one of the best-known illusions, the MĂĽller-Lyer illusion, now reproduced under conditions of real perception and by means of imagery. To that purpose, a tailored ad-hoc set of combined figures was presented to a total of 161 fine art students (M age = 20,34, SD = 1,75) who individually worked with two different variations of the MĂĽller-Lyer figures which consisted of a 10 mm long shaft and two fins set at an angle of 30Âş, being 15 mm long in one instance and 45 mm long in the other. In small groups, participants also completed an image control questionnaire. Results yielded that the longer the oblique lines, the larger the magnitude of the illusion both in the situation of real perception and in the imaginary situation. Also, the magnitude of the illusion augmented in the situation of perception in contrast to the imaginary situation, both with 15 mm long fins and with those of 45 mm. However, no significant differences were found in the magnitude of the illusion between high and low individuals in image control, although interactions between image control and other variables were indeed significant. The consistency of the outcome is a step forward in the study of illusions through mental images and opens the door to new lines of research that could involve innovative methods of analysis, different versions of the illusion and wider groups of participantsOpen Access funding provided thanks to the CRUECSIC (Universidade de Vigo/CISUG) agreement with Springer NatureS

    Language Barriers in Health Care Settings: An Annotated Bibliography of Research Literature

    Get PDF
    Provides an overview of resources related to the prevalence, role, and effects of language barriers and access in health care
    • …
    corecore