Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 130

Full-Text Articles in Entire DC Network

Stakeholders In Security Policy Development, S B. Maynard, A B. Ruighaver, A Ahmad Jan 2011

Stakeholders In Security Policy Development, S B. Maynard, A B. Ruighaver, A Ahmad

Australian Information Security Management Conference

The Information Security Policy (ISP) of an organisation is expected to specify for employees their behaviour towards security, and the security ethos of the organisation. However, there are a wide range of opinions and expertise that should be considered by organisations when developing an ISP. This paper aims to identify the stakeholders that should be utilised in an ISP development process and how this may differ based on organisational size. The research identifies from literature nine stakeholder roles that are suggested to be required in an ISP development process. Contextual interviews are then used to validate these nine stakeholder roles …


An Exploratory Study Of Erm Perception In Oman And Proposing A Maturity Model For Risk Optimization, Arun N. Shivashankarappa, D Ramalingam, Leonid Smalov, N Anbazhagan Jan 2011

An Exploratory Study Of Erm Perception In Oman And Proposing A Maturity Model For Risk Optimization, Arun N. Shivashankarappa, D Ramalingam, Leonid Smalov, N Anbazhagan

Australian Information Security Management Conference

Enterprise Risk management is a process vital to enterprise governance which has gained tremendous momentum in modern business due to the dynamic nature of threats, vulnerability and stringent regulatory requirements. The business owners have realized that, risk creates opportunity which in turn creates value. Identifying and mitigating risk proactively across the enterprise is the purview of Enterprise Risk Management (ERM).However, key errors in the ERM process such as misinterpretation of statistical data, overlooking change management, inadequate attention to supply chain interdependencies, excessive trust of insiders and business partners, ambiguous grouping of risks and poor documentation has contributed significantly to the …


Help Or Hindrance: The Practicality Of Applying Security Standards In Healthcare, Patricia A H Williams Jan 2011

Help Or Hindrance: The Practicality Of Applying Security Standards In Healthcare, Patricia A H Williams

Australian Information Security Management Conference

The protection of patient information is now more important as a national e-health system approaches reality in Australia. The major challenge for health care providers is to understand the importance information security whilst also incorporating effective protection into established workflow and daily activity. Why then, when it is difficult for IT and security professionals to navigate through and apply the myriad of information security standards, do we expect small enterprises such as primary health care providers to also be able to do this. This is an onerous and impractical task without significant assistance. In the development of the new Computer …


Ecological Restoration Of Novel Lake Districts: New Approaches For New Landscapes, Clinton D. Mccullough, Eddie J. Van Etten Jan 2011

Ecological Restoration Of Novel Lake Districts: New Approaches For New Landscapes, Clinton D. Mccullough, Eddie J. Van Etten

Research outputs 2011

Mine void pit lakes often contain water of poor quality with potential for environmental harm that may dwarf other mine closure environmental issues in terms of severity, scope, and longevity. This is particularly so when many pit lakes occur close together and thus form a new ‘‘lake district’’ landscape. Pit lakes that can be developed into healthy lake or wetland ecosystems as a beneficial end use provide opportunities for the mining industry to fulfil commitments to sustainability. Clearly articulated restoration goals and a strategic closure plan are necessary to ensure pit lake restoration toward a new, yet regionally-relevant, aquatic ecosystem, …


A Low Cost Adaptive Graphical User Interface For The Visually Handicapped With Multiple Conditions, David Veal, Stanislaw Maj Jan 2011

A Low Cost Adaptive Graphical User Interface For The Visually Handicapped With Multiple Conditions, David Veal, Stanislaw Maj

Research outputs 2011

Limited trials have been demonstrated that a Graphical User Interface (GUI) for the visually handicapped called Dynamic Pattern System (DPS) can adaptively utilize residual vision by generating different patterns, colors and shapes. Low vision simulators, used by normally sighted, have allowed researchers to clearly identify visual impairments that can be helped by DPS. However, it is not uncommon for the visually handicapped to suffer from multiple conditions having a multiplicative degenerative effect on their sight. This paper demonstrates how DPS can be used to assist individuals with compound sight disorders.


A Fibre Bragg Grating Sensor As A Receiver For Acoustic Communications Signals, Graham Wild, Steven Hinckley Jan 2011

A Fibre Bragg Grating Sensor As A Receiver For Acoustic Communications Signals, Graham Wild, Steven Hinckley

Research outputs 2011

A Fibre Bragg Grating (FBG) acoustic sensor is used as a receiver for acoustic communications signals. Acoustic transmissions were generated in aluminium and Carbon Fibre Composite (CFC) panels. The FBG receiver was coupled to the bottom surface opposite a piezoelectric transmitter. For the CFC, a second FBG was embedded within the layup for comparison. We show the transfer function, frequency response, and transient response of the acoustic communications channels. In addition, the FBG receiver was used to detect Phase Shift Keying (PSK) communications signals, which was shown to be the most robust method in a highly resonant communications channel.


Behaviour Profiling For Transparent Authentication For Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland Jan 2011

Behaviour Profiling For Transparent Authentication For Mobile Devices, Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland

Research outputs 2011

Since the first handheld cellular phone was introduced in 1970s, the mobile phone has changed significantly both in terms of popularity and functionality. With more than 4.6 billion subscribers around the world, it has become a ubiquitous device in our daily life. Apart from the traditional telephony and text messaging services, people are enjoying a much wider range of mobile services over a variety of network connections in the form of mobile applications. Although a number of security mechanisms such as authentication, antivirus, and firewall applications are available, it is still difficult to keep up with various mobile threats (i.e. …


How Green Are Climate Change Issues?: An Auditor's Perspective, Maya Purushothaman, Ross Taplin Jan 2011

How Green Are Climate Change Issues?: An Auditor's Perspective, Maya Purushothaman, Ross Taplin

Research outputs 2011

Climate change and carbon emissions have become an important issue for companies, not only if companies are to maintain legitimacy as good corporate citizens but also financially with the regulation of carbon emissions and the impending introduction of the Australian Emission Trading Scheme (AETS). This paper investigates the role of financial auditors in the climate change debate. Content analysis of the websites of fifteen large auditors in Australia reveals different reactions to this issue, from reacting to proposed legislation to proposing initiatives proactively and providing guidelines for companies. Analysis of the websites from a random sample of companies audited by …


Multi Camera Visual Saliency Using Image Stitching, Christopher Wing Hong Ngau, Li-Minn Ang, Kah Phooi Seng Jan 2011

Multi Camera Visual Saliency Using Image Stitching, Christopher Wing Hong Ngau, Li-Minn Ang, Kah Phooi Seng

Research outputs 2011

This paper presents and investigates two models for a multi camera configuration with visual saliency capability. Applications in various imaging fields each have a different set of detection parameters and requirements which would result in the necessity of software changes. The visual saliency capability offered by this multi camera model allows generic detection of conspicuous objects be it human or nonhuman based on simple low level features. As multiple cameras are used, an image stitching technique is employed to allow combination of Field-of-View (FoV) from different camera captures to provide a panoramic detection field. The stitching technique is also used …


Teaching Software Engineering Project Management-A Novel Approach For Software Engineering Programs, Craig Caulfield, David Veal, Stanislaw Maj Jan 2011

Teaching Software Engineering Project Management-A Novel Approach For Software Engineering Programs, Craig Caulfield, David Veal, Stanislaw Maj

Research outputs 2011

In response to real and perceived short-comings in the quality and productivity of software engineering practices and projects, professionally-endorsed graduate and post-graduate curriculum guides have been developed to meet technical developments and evolving industry demands. Each of these curriculum guidelines identifies better software project management skills as critical for all graduating students, but they provide little guidance on how to achieve this. One possible way is to use a serious game - a game designed to teach and educate players about some of the dynamic complexities of the field in a safe and inexpensive environment. This paper presents the results …


Inoculations With Arbuscular Mycorrhizal Fungi Increase Vegetable Yields And Decrease Phoxim Concentrations In Carrot And Green Onion And Their Soils, Fa Yuan Wang, Rui Jian Tong, Zhao Yong Shi, Xiao Feng Xu, Xinhua He Jan 2011

Inoculations With Arbuscular Mycorrhizal Fungi Increase Vegetable Yields And Decrease Phoxim Concentrations In Carrot And Green Onion And Their Soils, Fa Yuan Wang, Rui Jian Tong, Zhao Yong Shi, Xiao Feng Xu, Xinhua He

Research outputs 2011

Background As one of the most widely used organophosphate insecticides in vegetable production, phoxim (C12H15N2O3PS) is often found as residues in crops and soils and thus poses a potential threat to public health and environment. Arbuscular mycorrhizal (AM) fungi may make a contribution to the decrease of organophosphate residues in crops and/or the degradation in soils, but such effects remain unknown. Methodology/Principal Findings A greenhouse pot experiment studied the influence of AM fungi and phoxim application on the growth of carrot and green onion, and phoxim concentrations in the two vegetables and their soil media. Treatments included three AM fungal …


Gradients In The Number Of Species At Reef-Seagrass Ecotones Explained By Gradients In Abundance, Fernando Tuya, Mathew Vanderklift, Thomas Wernberg, Mads Thomsen Jan 2011

Gradients In The Number Of Species At Reef-Seagrass Ecotones Explained By Gradients In Abundance, Fernando Tuya, Mathew Vanderklift, Thomas Wernberg, Mads Thomsen

Research outputs 2011

Gradients in the composition and diversity (e. g. number of species) of faunal assemblages are common at ecotones between juxtaposed habitats. Patterns in the number of species, however, can be confounded by patterns in abundance of individuals, because more species tend to be found wherever there are more individuals. We tested whether proximity to reefs influenced patterns in the composition and diversity ('species density' = number of species per area and 'species richness' = number of species per number of individuals) of prosobranch gastropods in meadows of two seagrasses with different physiognomy: Posidonia and Amphibolis. A change in the species …


Reinforcement Learning Of Competitive And Cooperative Skills In Soccer Agents, Jinsong Leng, Chee Lim Jan 2011

Reinforcement Learning Of Competitive And Cooperative Skills In Soccer Agents, Jinsong Leng, Chee Lim

Research outputs 2011

The main aim of this paper is to provide a comprehensive numerical analysis on the efficiency of various reinforcementlearning (RL) techniques in an agent-based soccer game. The SoccerBots is employed as a simulation testbed to analyze the effectiveness of RL techniques under various scenarios. A hybrid agent teaming framework for investigating agent team architecture, learning abilities, and other specific behaviours is presented. Novel RL algorithms to verify the competitiveandcooperativelearning abilities of goal-oriented agents for decision-making are developed. In particular, the tile coding (TC) technique, a function approximation approach, is used to prevent the state space from growing exponentially, hence avoiding …


A New Seal Verification For Chinese Color Seal, Zhihu Huang, Jinsong Leng Jan 2011

A New Seal Verification For Chinese Color Seal, Zhihu Huang, Jinsong Leng

Research outputs 2011

Automatic seal imprint identification system is highly demanded in oriental countries. Even though several seal identification techniques have been proposed, it is seldom to find the papers on the recovery of lost seal imprint strokes caused by superimposition. In this paper, a new seal verification for Chinese color seal is proposed. This approach segments the seal imprint from the input image in terms of the adaptive thresholds. The lost seal imprint strokes are recovered based on the text stroke width that can be detected automatically. In addition, the moment-based seal verification is to compare the reference seal imprint and the …


The Relationship Between Water, Health And Global Environmental Change, As Interpreted Through Five Key Multilateral Environmental Agreements (Meas), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, Jo Mulongoy Jan 2011

The Relationship Between Water, Health And Global Environmental Change, As Interpreted Through Five Key Multilateral Environmental Agreements (Meas), Pierre Horwitz, Lucilla Spini, Kathryn Campbell, R J Thomas, Jo Mulongoy

Research outputs 2011

For five Multilateral Environmental Agreements (MEAs), we have examined the way the relationship between water, health and global environmental change is expressed and how it has evolved recently. We recognize a distinction between an emphasis on water and reservoirs of water for health (for drinking water supplies, sanitation and hygiene), and a focus on places of water, where wetland ecosystems provide a service for human well-being which encompasses health. We also recognize a trend over time for the MEAs to increasingly address water, health and global change issues as a reaction to emerging infectious diseases and global pandemics. For both …


Limiting Factors For Crayfish And Finfish In Acidic Coal Pit Lake, Clinton Mccullough, Mark Lund Jan 2011

Limiting Factors For Crayfish And Finfish In Acidic Coal Pit Lake, Clinton Mccullough, Mark Lund

Research outputs 2011

World-wide, open-cut mining operations often leave pit lakes at closure. The Collie Lake District in south-west Australia has 13 pit lakes from open-cut coal extraction, with more expected. Many lakes may offer beneficial end uses as fisheries habitat for biodiversity or for recreational species. However, pit lakes may have degraded water quality due to Acid and Metalliferous Drainage (AMD). A literature review and survey for marron (endemic crayfish of biodiversity and recreational value) and fin-fish (of only biodiversity value) found that crayfish were likely more limited by habitat and food availability, and fin-fish by water quality. Management of these mild …


Synthesis Of High-Performance Magnetic Garnet Materials And Garnet-Bismuth Oxide Nanocomposites Using Physical Vapor Deposition Followed By High-Temperature Crystallization, Mohammad Nur E Alam, Mikhail Vasiliev, Kamal Alameh, Viacheslav Kotov Jan 2011

Synthesis Of High-Performance Magnetic Garnet Materials And Garnet-Bismuth Oxide Nanocomposites Using Physical Vapor Deposition Followed By High-Temperature Crystallization, Mohammad Nur E Alam, Mikhail Vasiliev, Kamal Alameh, Viacheslav Kotov

Research outputs 2011

Bi-substituted iron garnet (Bi:IG) compounds synthesized in thin film form are the best semi-transparent magneto-optical (MO) materials for applications in magnetic recording, optical sensors, and photonics. These materials can possess attractive magnetic properties and the highest specific Faraday rotation in the visible and near-infrared spectral regions, if the deposited layers contain a high volumetric fraction of the garnet phase and possess high-quality surfaces and microstructure. In this paper, we study the effects of various deposition and annealing process parameters on the properties of Bi:IG and garnet-oxide nanocomposite films of several composition types fabricated using radio-frequency (RF) sputtering deposition followed by …


A Preliminary Introduction To The Otam: Exploring Users’ Perceptions Of Their On-Going Interaction With Adopted Technologies, Shirlee-Ann Knight, Janice M. Burn Jan 2011

A Preliminary Introduction To The Otam: Exploring Users’ Perceptions Of Their On-Going Interaction With Adopted Technologies, Shirlee-Ann Knight, Janice M. Burn

Research outputs 2011

A common criticism directed at Davis’ (1986; 1989) Technology Acceptance Model relates to its failure to adequately frame the “experienced” user’s ongoing adoption and exploitation of information technologies. Given the pervasive nature of technology into individual users’ ongoing, everyday communication and information interactions, along with the “new adopter” becoming an increasingly rare entity, the TAM is in danger of becoming a somewhat obsolete framework for investigating user-technology interaction. Presented is a critical analysis of the development and current state of the TAM, followed by a proposed addition to the existing Perceived Usefulness (PU) and Perceived Ease of Use (PEoU) TAM …


Children's Exposure To Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, Andrea Lee Hinwood Jan 2011

Children's Exposure To Metals: A Community-Initiated Study, Anna Carita Callan, Matthew Winters, Caroline Barton, Mary C. Boyce, Andrea Lee Hinwood

Research outputs 2011

In 2007, it was shown that the shipping of lead (Pb) through Esperance Port in Western Australia resulted in contamination and increased Pb concentrations in children. A clean-up strategy was implemented; however, little attention was given to other metals. In consultation with the community, a cross-sectional exposure study was designed. Thirty-nine children aged 1 to 12 years provided samples of hair, urine, drinking water, residential soil and dust. Concentrations of nickel (Ni) and Pb were low in biological and environmental samples. Hair aluminium (Al) (lower than the detection limit [DL] to 251 μg/g) and copper (Cu) (7 to 415 μg/g), …


Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk Jan 2011

Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk

Research outputs 2011

In theory, an ADSL router can provide an additional layer of security to a wired and wireless network through; access control, wireless encryption, firewall rule sets, and network event logging. An ADSL router may also contain the users’ usage habits and broadband account credentials. However, end-users may be unaware of the intricacies of the security measures available and the potentially confidential information stored on their device. As a result a second hand ADSL router may contain a wealth of user-specific information if not wiped and disposed of in a secure manner. This paper shows the data that was acquired from …


Subtidal Macroalgal Richness, Diversity And Turnover, At Multiple Spatial Scales, Along The Southwestern Australian Coastline, David Smale, G Kendrick, Thomas Wernberg Jan 2011

Subtidal Macroalgal Richness, Diversity And Turnover, At Multiple Spatial Scales, Along The Southwestern Australian Coastline, David Smale, G Kendrick, Thomas Wernberg

Research outputs 2011

Patterns of species richness are governed by processes that act at vastly different spatial scales. In the marine system of southwest Australia, macroalgal assemblage structure and richness is thought to be strongly influenced by both the Leeuwin Current, which acts at large regional spatial scales, and small-scale processes such as competition, wave disturbance and habitat heterogeneity. We examined macroalgal species richness and diversity at multiple spatial scales using a three-factor hierarchal design. Spatial extents ranged from metres (between quadrats) to many hundreds of kilometres (between regions), and the study encompassed almost 2000 km of temperate coastline. Macroalgal assemblages were highly …


Spatially Resolved Inhomogeneous Depressions Of The Excitons Zeeman Splitting In An Integrated Magnetic-Multiple Quantum Wells System, Ahmed Abdelrahman, Hoon Soo Kang, Sang Youp Yim, Mikhail Vasiliev, Kamal Alameh, Yong Lee Jan 2011

Spatially Resolved Inhomogeneous Depressions Of The Excitons Zeeman Splitting In An Integrated Magnetic-Multiple Quantum Wells System, Ahmed Abdelrahman, Hoon Soo Kang, Sang Youp Yim, Mikhail Vasiliev, Kamal Alameh, Yong Lee

Research outputs 2011

We report on the generation of a nonuniform spatial distribution of the heavy and light-hole excitons in a multiple quantum wells system integrated with a localized inhomogeneous weak magnetic field. An inhomogeneous spatially resolved depression of the Zeeman splittings of the heavy-hole excitons and the light-hole excitons with respect to their translational wave vectors is observed. A localized inverted concentration of the two types of the excitons due to the inhomogeneity of the magnetic field is also measured. A simple method to integrate permanent magnetic materials with the multiple quantum wells system is used to create an accessible degree of …


The Combined Conceptual Life Cycle Model Of Information Quality In User Perceptions Of Iq On The Web, Shirlee-Ann Knight Jan 2011

The Combined Conceptual Life Cycle Model Of Information Quality In User Perceptions Of Iq On The Web, Shirlee-Ann Knight

Research outputs 2011

Presented is the Combined Conceptual Life Cycle (CCLC) Model of Information Quality (IQ). The CCLC conceptualises information/data quality as being a highly relative construct, best understood in terms of sixteen IQ dimensions housed within four broad IQ categories: namely; Intrinsic IQ, Representational IQ, Interactional IQ, and Contextual IQ. The four categories themselves are seen as falling into two information life cycle contexts: that of (1) data/information generation and (2) data/information use. By conceptualising user perceptions of IQ in terms of the information life cycle, the model is able to demonstrate where in the information life cycle users are most likely …


Analysis Of Key Installation Protection Using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, Martin Masek Jan 2011

Analysis Of Key Installation Protection Using Computerized Red Teaming, Tirtha Ranjeet, Philip Hingston, Chiou Peng Lam, Martin Masek

Research outputs 2011

This paper describes the use of genetic algorithms (GAs) for computerized red teaming applications, to explore options for military plans in specific scenarios. A tool called Optimized Red Teaming (ORT) is developed and we illustrate how it may be utilized to assist the red teaming process in security organizations, such as military forces. The developed technique incorporates a genetic algorithm in conjunction with an agent-based simulation system (ABS) called MANA (Map Aware Non-uniform Automata). Both enemy forces (the red team) and friendly forces (the blue team) are modelled as intelligent agents in a multi-agent system and many computer simulations of …


Quantitative Approaches In Climate Change Ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, Anthony J. Richardson Jan 2011

Quantitative Approaches In Climate Change Ecology, Christopher J. Brown, David S. Schoeman, William J. Sydeman, Keith Brander, Lauren B. Buckley, Michael Burrows, Carlos M. Duarte, Pippa J. Moore, John M. Pandolfi, Elvira Poloczanska, William Venables, Anthony J. Richardson

Research outputs 2011

Contemporary impacts of anthropogenic climate change on ecosystems are increasingly being recognized. Documenting the extent of these impacts requires quantitative tools for analyses of ecological observations to distinguish climate impacts in noisy data and to understand interactions between climate variability and other drivers of change. To assist the development of reliable statistical approaches, we review the marine climate change literature and provide suggestions for quantitative approaches in climate change ecology. We compiled 267 peer-reviewed articles that examined relationships between climate change and marine ecological variables. Of the articles with time series data (n = 186), 75% used statistics to test …


An Investigation Into Darknets And The Content Available Via Anonymous Peer-To-Peer File Sharing, Symon Aked Jan 2011

An Investigation Into Darknets And The Content Available Via Anonymous Peer-To-Peer File Sharing, Symon Aked

Australian Information Security Management Conference

Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouse click away. However, can Darknets really be easily accessed, and do they provide access to material that would otherwise be difficult to obtain? This paper investigates which Darknets are easily discovered, the technical designs and methods used to hide content on the networks, the tools needed to join, and ultimately what type and quantities of files can be found on anonymous peer-to-peer file sharing networks. This information …


Implementation Of Iso 27001 In Saudi Arabia – Obstacles, Motivations, Outcomes, And Lessons Learned, Belal Abusaad, Fahad A. Saeed, Khaled Alghathbar, Bilal Khan Jan 2011

Implementation Of Iso 27001 In Saudi Arabia – Obstacles, Motivations, Outcomes, And Lessons Learned, Belal Abusaad, Fahad A. Saeed, Khaled Alghathbar, Bilal Khan

Australian Information Security Management Conference

Protecting information assets is very vital to the core survival of an organization. With the increase in cyberattacks and viruses worldwide, it has become essential for organizations to adopt innovative and rigorous procedures to keep these vital assets out of the reach of exploiters. Although complying with an international information security standard such as ISO 27001 has been on the rise worldwide, with over 7000 registered certificates, few companies in Saudi Arabia are ISO 27001 certified. In this paper, we explore the motives, obstacles, challenges, and outcomes for a Saudi organization during their implementation of ISO 27001, with the goal …


User Perceptions Of End User License Agreements In The Smartphone Environment, Hamish Cotton, Christopher Bolan Jan 2011

User Perceptions Of End User License Agreements In The Smartphone Environment, Hamish Cotton, Christopher Bolan

Australian Information Security Management Conference

With the increasing usage of smartphones as a computing platform has come alongside the movement of End User License Agreements to such platforms. The smartphone platform brings new issues to these agreements especially with the advent of app stores, which allow access to a large consumer base to small or unknown developers. This survey conducted in Perth, Western Australia looked at user perceptions of EULAs on smartphone devices. The results show that a majority of users do not read such agreements citing issues of readability and length. Even amongst those that do read the agreements there is a majority feeling …


Out-Of-Band Wormhole Attack Detection In Manets, Sana Ul Haq, Faisal B. Hussain Jan 2011

Out-Of-Band Wormhole Attack Detection In Manets, Sana Ul Haq, Faisal B. Hussain

Australian Information Security Management Conference

Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate router and client. In this way, multi-hop communication occurs in MANETs and thus it is a difficult task to establish a secure path between source and destination. The purpose of this work is overcome a special attack called wormhole attack launched by at least two colluding nodes within the …


Trusted Interoperability And The Patient Safety Issues Of Parasitic Health Care Software, Vincent B. Mccauley, Patricia A H Williams Jan 2011

Trusted Interoperability And The Patient Safety Issues Of Parasitic Health Care Software, Vincent B. Mccauley, Patricia A H Williams

Australian Information Security Management Conference

With the proliferation of software systems and products in the healthcare environment, it is increasingly common for such software products to be constructed in a modular design. However, for modular software to be securely interoperable with other software products requires agreed consistent and accountable interfaces. This agreement may take the form of bilateral vendor to vendor arrangements or via a trusted external third-party who coordinates agreed interaction methods, such as a jurisdiction. Standards are a particular form of mutually trusted third party. Unfortunately, this agreed method of interoperability is not always present in vendor software. Where one software product or …