40 research outputs found

    Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey

    Get PDF
    Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research

    Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

    Get PDF
    Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff’ views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA - Adaptive Trust-based e-Assessment System in six countries: UK, Spain, Netherlands, Bulgaria, Finland and Turkey. The findings revealed some technological, organisational and pedagogical issues related to accessibility, security, privacy and e-assessment design and feedback. Recommendations are to provide: a FAQ and an audit report with results, to raise awareness about data security and privacy, to develop policies and guidelines about fraud detection and prevention, e-assessment best practices and course team support

    Confidentiality, anonymity and amnesty for midwives in distress seeking online support – Ethical?

    Get PDF
    BACKGROUND: Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. RESEARCH DESIGN: Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. FINDINGS: Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. DISCUSSION: Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. CONCLUSION: In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this article argue that the principles of confidentiality, anonymity and amnesty should be upheld in the pursuit of the greatest benefit for the greatest number of people

    Mechanism of gallic acid biosynthesis in bacteria (Escherichia coli) and walnut (Juglans regia)

    Get PDF
    Gallic acid (GA), a key intermediate in the synthesis of plant hydrolysable tannins, is also a primary anti-inflammatory, cardio-protective agent found in wine, tea, and cocoa. In this publication, we reveal the identity of a gene and encoded protein essential for GA synthesis. Although it has long been recognized that plants, bacteria, and fungi synthesize and accumulate GA, the pathway leading to its synthesis was largely unknown. Here we provide evidence that shikimate dehydrogenase (SDH), a shikimate pathway enzyme essential for aromatic amino acid synthesis, is also required for GA production. Escherichia coli (E. coli) aroE mutants lacking a functional SDH can be complemented with the plant enzyme such that they grew on media lacking aromatic amino acids and produced GA in vitro. Transgenic Nicotianatabacum lines expressing a Juglans regia SDH exhibited a 500% increase in GA accumulation. The J. regia and E. coli SDH was purified via overexpression in E. coli and used to measure substrate and cofactor kinetics, following reduction of NADP+ to NADPH. Reversed-phase liquid chromatography coupled to electrospray mass spectrometry (RP-LC/ESI–MS) was used to quantify and validate GA production through dehydrogenation of 3-dehydroshikimate (3-DHS) by purified E. coli and J. regia SDH when shikimic acid (SA) or 3-DHS were used as substrates and NADP+ as cofactor. Finally, we show that purified E. coli and J. regia SDH produced GA in vitro

    New facets of mobile botnet: architecture and evaluation

    No full text

    Never say never: Authoritative TLD nameserver-powered DNS amplification

    No full text

    Hidden in plain sight. SDP-based covert channel for botnet communication

    No full text

    Vivid educational experience with virtual reality

    No full text

    DNS amplification attack revisited

    No full text
    corecore