Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Faculty of Informatics - Papers (Archive)

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

Human Rights, Regulation, And National Security (Introduction), Simon Bronitt, Katina Michael Jan 2012

Human Rights, Regulation, And National Security (Introduction), Simon Bronitt, Katina Michael

Faculty of Informatics - Papers (Archive)

Law disciplines technology, though it does so in a partial and incomplete way. This fact is refl ected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a signifi cant threat to human rights. The pervasive use of closedcircuit television (CCTV), as well as mobile CCTV, telecommunications interception, and low-cost audiovisual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations to signifi cantly intrude into the lives of citizens.


Improving Security Of Q-Sdh Based Digital Signatures, Fuchun Guo, Yi Mu, Willy Susilo Jan 2011

Improving Security Of Q-Sdh Based Digital Signatures, Fuchun Guo, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

In Eurocrypt 2009, Hohenberger and Waters pointed out that a complexity assumption, which restricts the adversary to a single correct response, seems inherently more reliable than their flexible counterparts. The q-SDH assumption is less reliable than standard assumptions because its solution allows exponential answers. On the other hand, the q-SDH assumption exhibits the nice feature of tight reduction in security proof. In this paper, we propose a variant of the q-SDH assumption, so that its correct answers are polynomial and no longer exponentially many. The new assumption is much more reliable and weaker than the original q-SDH assumption. We propose …


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Jan 2010

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Faculty of Informatics - Papers (Archive)

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


The Social Impact Of National Security Technologies: Epassports, E911 And Mobile Alerts, Holly Tootell Jan 2008

The Social Impact Of National Security Technologies: Epassports, E911 And Mobile Alerts, Holly Tootell

Faculty of Informatics - Papers (Archive)

This paper explores the adoption of emerging technologies for the purposes of national security. The three technologies chosen were ePassports, E911 and mobile alerts. The study uses a content analysis methodology drawing on popular media documentation to extract the major social and technological impacts of the technologies on citizens as they were reported. The find i ngs of the study indicate that reactions to the three technologies differed. ePassports were considered vastly different to E911 and mobile alerting predominantly because they were seen to be a controlling technology, whereas E911 and mobile alerting were viewed to be about safety and …


National Security And The Misology-Misanthropy Paradox Of Technology, George M. Mickhail Jan 2008

National Security And The Misology-Misanthropy Paradox Of Technology, George M. Mickhail

Faculty of Informatics - Papers (Archive)

The evolution of computing did not only result in the disengagement of thepopulace from its technological complexity, but also their submission to thedivine ability of 'scientists', who understand the mathematical complexityof information technologies. Socrates argued that both 'misanthropy' and'misology' stem from 'faith' placed in unreliable people and unsoundarguments. Such misplaced faith in surveillance technologies and theirprotractors, for example, often results in disengagement from debate, whichto Socrates was the antithesis to truth and wisdom. This paper explores howsociety is opting out of debate through the machinations of a neoconservativecredo that purports reason. Under the guise of freedom and democracy, suchdogma often …


The Benefits & Concerns Of Public Data Availability In Australia: A Survey Of Security Experts, Roba Abbas Jan 2007

The Benefits & Concerns Of Public Data Availability In Australia: A Survey Of Security Experts, Roba Abbas

Faculty of Informatics - Papers (Archive)

This paper gauges the attitudes of security experts in Australia with regards to public data availability on critical infrastructure protection (CIP). A qualitative survey was distributed to a individuals considered experts in CIP-related research in Australia, in order to address the censorship versus open access debate concerning public data. The intention of the study was to gain an insight into the perceived benefits and threats of public data availability by security experts, and to provide the basis for a security solution to be utilised by the Australian Government sector (at all levels). The findings however can also be applied to …


Modelling Mas-Specific Security Features, Ghassan Beydoun, Graham C. Low, Haralambos Mouratidis, Brian Henderson-Sellers Jan 2007

Modelling Mas-Specific Security Features, Ghassan Beydoun, Graham C. Low, Haralambos Mouratidis, Brian Henderson-Sellers

Faculty of Informatics - Papers (Archive)

In this paper, we pursue a modelling approach to address security requirements for multi-agent systems (MAS). This will allow developers to account for both the system and agent-specific security requirements of a MAS during the requirements phase and throughout the whole Software Development Lifecycle of the system. We focus on autonomy, mobility and cooperation of individual agents and how these create additional security vulnerabilities to the system. In proposing a set of generic modelling primitives for these engendered requirements in the analysis of the MAS, we extend our recently proposed MAS metamodel.


Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola Jan 2007

Rfid-Based Anti-Theft Auto Security System With An Immobilizer, Geeth Jayendra, Sisil Kumarawadu, Lasantha Meegahapola

Faculty of Informatics - Papers (Archive)

This paper presents a novel radio frequency identification (RFID) based vehicle immobilizer system, which features low hacking probability while preserving the safety of the passengers of the hijacked vehicle. The immobilizer uses the active RFID technology where the tag is generated with comparatively large character sets. The receiving unit is intelligently integrated into three control circuits in the vehicle, namely, ignition circuit, power control unit, and automatic gear changing system, enabling it to bring the vehicle speed down to zero in a safe step by step manner. The anti-theft auto security system proposed here was tested under different weather conditions …


The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael Dec 2006

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael Dec 2006

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael Oct 2006

Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) rely on knowledge of a user’s location to provide tailored services or information by means of a wireless device. LBS applications have wide-ranging implications for society, particularly in the context of tracking and monitoring groups of individuals such as children, invalids, and parolees. Despite a great deal of attention paid to technical and commercial aspects of LBS technologies, consideration of the legal, ethical, social and technology momentum issues involved has been wanting. This paper examines some of the more pressing issues that are expected to arise from the widespread use of LBS. The outcome of this paper …


Using Scenario Planning In The Evaluation Of Information Security Applications, Laura Perusco Jan 2006

Using Scenario Planning In The Evaluation Of Information Security Applications, Laura Perusco

Faculty of Informatics - Papers (Archive)

This paper provides a broad overview of the scenario approach as it relates to the evaluation of location based services (LBS) technologies and their appl ication. A scenario is a plausible vision of the future, based around a particular technology or application and developed via a scenario planning methodology. The main worth of the scenario planning approach is that it allows an application to be evaluated in terms of potential social impacts as well as technical merit and commercial viability. A sample scenario is presented within the paper to illustrate how the scenario planning methodology can be used. This scenario …


Security Analysis Of Michael: The Ieee 802.11i Message Integrity Code, Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder Jan 2005

Security Analysis Of Michael: The Ieee 802.11i Message Integrity Code, Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder

Faculty of Informatics - Papers (Archive)

The latest IEEE 802.11i uses a keyed hash function, called Michael, as the message integrity code. This paper describes some properties and weaknesses of Michael. We provide a necessary and sufficient condition for finding collisions of Michael. Our observation reveals that the collision status of Michael only depends on the second last block message and the output of the block function in the third last round. We show that Michael is not collision-free by providing a method to find collisions of this keyed hash function. Moreover, we develop a method to find fixed points of Michael. If the output …