58 research outputs found

    Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey

    Get PDF
    Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research

    Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles

    Full text link
    Web personalization is an elegant and flexible process of making a web site responsive to the unique needs of each individual user. Data that reflects user prefe-rences and likings, comprising therefore a user profile, are gathered to an adaptive web site in a non transpa-rent manner. This situation however raises serious privacy concerns to the end user. When browsing a web site, users are not aware of several important pri-vacy parameters i.e., which behavior will be monitored and logged, how it will be processed, how long it will be kept, and with whom it will be shared in the long run. In this paper we propose an abstract architecture that enhances user privacy during interaction with adaptive web sites. This architecture enables users to create and update their personal privacy preferences for the adaptive web sites they visit by holding their (user) profiles in the client side instead of the server side. By doing so users will be able to self-confine the personalization experience the adaptive sites offer, thus enhancing privacy

    Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

    Get PDF
    Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff’ views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA - Adaptive Trust-based e-Assessment System in six countries: UK, Spain, Netherlands, Bulgaria, Finland and Turkey. The findings revealed some technological, organisational and pedagogical issues related to accessibility, security, privacy and e-assessment design and feedback. Recommendations are to provide: a FAQ and an audit report with results, to raise awareness about data security and privacy, to develop policies and guidelines about fraud detection and prevention, e-assessment best practices and course team support

    Confidentiality, anonymity and amnesty for midwives in distress seeking online support – Ethical?

    Get PDF
    BACKGROUND: Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. RESEARCH DESIGN: Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. FINDINGS: Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. DISCUSSION: Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. CONCLUSION: In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this article argue that the principles of confidentiality, anonymity and amnesty should be upheld in the pursuit of the greatest benefit for the greatest number of people

    Mechanism of gallic acid biosynthesis in bacteria (Escherichia coli) and walnut (Juglans regia)

    Get PDF
    Gallic acid (GA), a key intermediate in the synthesis of plant hydrolysable tannins, is also a primary anti-inflammatory, cardio-protective agent found in wine, tea, and cocoa. In this publication, we reveal the identity of a gene and encoded protein essential for GA synthesis. Although it has long been recognized that plants, bacteria, and fungi synthesize and accumulate GA, the pathway leading to its synthesis was largely unknown. Here we provide evidence that shikimate dehydrogenase (SDH), a shikimate pathway enzyme essential for aromatic amino acid synthesis, is also required for GA production. Escherichia coli (E. coli) aroE mutants lacking a functional SDH can be complemented with the plant enzyme such that they grew on media lacking aromatic amino acids and produced GA in vitro. Transgenic Nicotianatabacum lines expressing a Juglans regia SDH exhibited a 500% increase in GA accumulation. The J. regia and E. coli SDH was purified via overexpression in E. coli and used to measure substrate and cofactor kinetics, following reduction of NADP+ to NADPH. Reversed-phase liquid chromatography coupled to electrospray mass spectrometry (RP-LC/ESI–MS) was used to quantify and validate GA production through dehydrogenation of 3-dehydroshikimate (3-DHS) by purified E. coli and J. regia SDH when shikimic acid (SA) or 3-DHS were used as substrates and NADP+ as cofactor. Finally, we show that purified E. coli and J. regia SDH produced GA in vitro

    Orchid plant with seven flowers in a pot, New South Wales, ca. 1930 [picture].

    No full text
    Title devised from accompanying information where available.; Part of the: Fairfax archive of glass plate negatives.; Fairfax number: p.871/1.; Condition: broken ; missing corner.; Also available online at: http://nla.gov.au/nla.pic-vn6194063; Acquired from Fairfax Media, 2012

    New facets of mobile botnet: architecture and evaluation

    No full text
    corecore