42 research outputs found

    Creating the Ideal Digital Self: 3G Mobile Phone Content Production and Distribution as Social Communication

    Get PDF
    Mobile phone ownership presents users with the opportunity to regularly update others of their actions through the digital documentation and circulation of their experiences. There is a sense that an event is not complete until it is shared through text, voice or images. An empirical study of 35 users aged 18-30, conducted for the Smart Internet Technology CRC [3] revealed that when members of a social group cannot be together physically, circulating digitised accounts of an activity becomes an authentic way to share the event. Furthermore, the study indicated that with the convergence of 3G mobile phones, digital cameras and the Internet, users are taking advantage of the best of all three communication channels to create, circulate, distribute and archive content in new and dynamic ways. Through this process users are creating the 'ideal digital self' by which to communicate socially. However, the effectiveness of these new practices is eroded by specific design and technological limitations, thus a distinct set of user problems emerged. This paper illustrates how the Trophy Room scenario, which is a 3G phone and web application, was developed to address the user needs identified in the study

    Authentication and authorisation in entrusted unions

    Get PDF
    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported

    miR-223 Regulates Cell Growth and Targets Proto-Oncogenes in Mycosis Fungoides/Cutaneous T-Cell Lymphoma

    Get PDF
    The pathogenesis of the cutaneous T-cell lymphoma (CTCL), mycosis fungoides (MF), is unclear. MicroRNA (miRNA) are small noncoding RNAs that target mRNA leading to reduced mRNA translation. Recently, specific miRNA were shown to be altered in CTCL. We detected significantly reduced expression of miR-223 in early-stage MF skin, and further decreased levels of miR-223 in advanced-stage disease. CTCL peripheral blood mononuclear cells and cell lines also had reduced miR-223 as compared with controls. Elevated expression of miR-223 in these cell lines reduced cell growth and clonogenic potential, whereas inhibition of miR-223 increased cell numbers. Investigations into putative miR-223 targets with oncogenic function, including E2F1 and MEF2C, and the predicted miR-223 target, TOX, revealed that all three were targeted by miR-223 in CTCL. E2F1, MEF2C, and TOX proteins were decreased with miR-223 overexpression, whereas miR-223 inhibition led to increased protein levels in CTCL. In addition, we showed that the 3′-UTR of TOX mRNA was a genuine target of miR-223. Therefore, reduced levels of miR-223 in MF/CTCL lead to increased expression of E2F1, MEF2C, and TOX, which likely contributes to the development and/or progression of CTCL. Thus, miR-223 and its targets may be useful for the development of new therapeutics for MF/CTCL

    Authentication and authorisation in entrusted unions

    Get PDF
    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported

    3G Multimedia Content Production as Social Communication

    Get PDF
    Mobile phone ownership presents users with the opportunity to regularly update others of their actions through the digital documentation and circulation of their experiences. There is a sense that an event is not complete until it is shared through text, voice or images. A study of 35 users aged 18- 30, conducted for the Smart Internet Technology CRC revealed that when members of a social group cannot be together physically, circulating digitised accounts of an activity becomes an authentic way to share the event. Furthermore, the study indicated that with the convergence of 3G mobile phones, digital cameras and the Internet, users are taking advantage of the best of all three communication channels to create, circulate, distribute and archive content in new and dynamic ways. Through this process users are creating the ‘ideal digital self’ by which to communicate. However, the effectiveness of these new practices is eroded by specific design and technological limitations, thus a distinct set of user problems emerged. This paper illustrates how the Trophy Room scenario, which is a 3G phone and web application was developed to address the user needs identified in the study

    Time Constrained Buffer Specifications in CSP+T and Timed CSP

    No full text
    A finite buffer with time constraints on the rate of accepting inputs, producing outputs and message latency is specified using both Timed CSP and a new real-time specification language, CSP+T. CSP+T adds expressive power to some of the sequential aspects of CSP and allows the description of complex event timings from within a single sequential process. On the other hand, Timed CSP encourages event timing descriptions to be built up in a constraint-oriented manner with the parallel composition of several processes. Although these represent two complementary specification styles, both provide valuable insights into specification of complex event timings. E-mail: [email protected] 1 Introduction There has been considerable effort recently in extending Hoare's CSP [7] and Milner's CCS [8, 9] to allow formal reasoning about real-time systems. Examples of such systems are commonly found in communication protocols where the response to a message is required before the message becomes..

    Data Spread: A Novel Authentication and Security Technique

    No full text
    This paper describes an authentication and security protocol called data spread for use on the Internet. The protocol applies address space diversity to outgoing messages, and when combined with reasonable (but not necessarily strong) encryption techniques, offers fast, secure and authentic-able information exchange between communicating entities. 1 Introduction Message security and authentication has been of interests to humanity for as long as there have been secrets. The development of broadcast radio-based communication meant that all communication was available to anyone who could receive the radio signal. As a consequence, radio communication in the early to mid 20th century relied on encryption techniques to provide message secrecy. However, there were two major problems with using plain encryption. First, messages could be intercepted, and subsequently analyzed, with the aim of breaking the encryption cipher (as was done with the Enigma Code). Once the cipher was broken, mes..
    corecore