Spelling suggestions: "subject:"secrecy."" "subject:"secrecys.""
171 |
Entre Hippocrate et De Coubertin: les obligations professionnelles des médecins face au dopage sportifSamuël, Julie 03 1900 (has links)
Le contexte particulier du dopage suscite de nombreuses questions à l'égard des obligations et de la responsabilité des médecins. Suivant le Code médical du Mouvement olympique (2005), les médecins doivent respecter les principes de l'éthique médicale et ceux de l'éthique sportive, comme le fairplay. Il arrive parfois que l'éthique sportive entre en conflit avec l'éthique médicale. Les médecins sont alors confrontés à d'importants dilemmes qui peuvent engager leur responsabilité professionnelle et civile. Ces dilemmes se situent notamment au niveau de l'obligation de soins et du secret professionnel. Par exemple, les médecins peuvent-ils prescrire des médicaments pour contrer les effets néfastes du dopage afin de préserver la santé des athlètes ? La question de la recherche sur l'amélioration de la performance est également préoccupante. En raison du caractère clandestin de cette recherche, il y a lieu de se demander si les médecins qui y participent respectent leurs obligations professionnelles. L'analyse des principaux instruments normatifs applicables en l'espèce démontre que les médecins ne doivent pas être placés dans une situation telle qu'ils doivent refuser de suivre des athlètes de crainte d'être accusés de dopage. De plus, le secret professionnel devrait être maintenu lorsqu'un médecin suit un athlète dopé afin de préserver la relation de confiance. Finalement, l'analyse du contexte de la recherche portant sur l'amélioration de la performance révèle que les médecins ne respectent pas toujours leurs obligations. Les médecins fautifs risquent donc d'engager leur responsabilité professionnelle et civile et de faire face à des sanctions sévères. / The particular context of doping raises many questions regarding the obligations and the liability of physicians. According to the Medical Code of the Olympic Movement (2005), physicians must respect the principles of medical ethics as well as those of sport ethics, such as fair play. Sometimes, sport ethics conflicts with medical ethics. Therefore, physicians are confronted with important dilemmas, which could engage their professional and civil liability. These dilemmas concern, in particular, the duty of care and professional secrecy. For example, could physicians prescribe drugs to counter the side effects of doping in order to preserve the health of the athletes? Issues surrounding research on the improvement of performance is also of interest. Because of the often clandestine nature of this research, it should be asked whether physicians who participate respect their professional obligations. An analysis of the principal normative documents applicable demonstrates that physicians should not be placed in a situation where they would refuse to treat athletes because of fear of accusations of doping. Moreover, professional secrecy should be maintained when a physician follows an athlete in order to preserve the relation of trust. Finally, the analysis of the context of the research on the improvement of performance reveals that physicians don't always respect their obligations. These physicians might engage their professional and civil liability and face severe sanctions.
|
172 |
La circulation de la donnée à caractère personnel relative à la santé : disponibilité de l’information et protection des droits de la personne / Free movement of personal health data : Information availability and rights of data subjectBrasselet, Renato 03 December 2018 (has links)
La e santé, la m-santé et la quantification de soi connectent le corps et bousculent le modèle traditionnel du soin. Ils le font glisser d’une médecine curative et monopolistique à une médecine préventive et adoptant une approche de la santé telle que définie par l’OMS. Par ce truchement, la personne n’est plus simplement placée au centre du dispositif de soin elle en devient l’un des acteurs y compris dans l’intimité de sa vie privée. Par ailleurs, sans cesse à la recherche de la réalisation d’économie mais aussi de qualité, le système de santé, a muté, sous l’effet du déploiement de l’e-santé. Il en résulte qu’il est désormais substantiellement décloisonné et ne peut plus être synthétisé dans la dichotomie classique entre le sanitaire et le médico-social. Le vecteur et la résultante de ce phénomène consiste dans la circulation de l’information de santé. Désormais majoritairement numérisée elle est devenue indispensable au soin ainsi qu’au fonctionnement du système de santé. Le soin est désormais conçu autour de l’échange et du partage catégoriel et inter-catégoriel, voire même homme-machine ou machine-machine et non plus sur une médecine fondée sur le secret. L’Homme devenu homo numericus n’en est pas pour autant dépourvu de tout droits et de toute intimité. Le droit et la techno-droit s’inscrivent dans ce jeu savant dont la moindre réforme inconséquente pourrait en bouleverser l’équilibre précaire / Health, m-health and self quantification connect the body and disrupt the traditional model of care. They are moving it from curative and monopoly medicine to preventive medicine and taking a WHO-defined approach to health. By this means, the person is no longer simply placed at the center of the care device he becomes one of the actors including in the intimacy of his privacy.On the other hand, in search of the realization of economy but also of quality, the health system, has mutated, under the effect of the deployment of e-health. As a result, it is now substantially landscaped and can no longer be synthesized into the classic dichotomy between health and social medicine. The vector and resultant of this phenomenon consists in the circulation of health information. From now on, it has become largely digital and essential for the care and functioning of the healthcare system. The care is now conceived around categorical and inter-categorical exchange and sharing, even man-machine or machine-machine and no longer on a medicine based on secrecy. The Man who has become a homo Numericus is not without all rights and privacy. Law and techno-law are part of this scholarly game, the slightest inconsistent reform of which could upset its precarious balance
|
173 |
O direito constitucional ao sigilo na relação entre jornalistas e fontes de informação: contradições, conflitos e propostasDenardi, Eveline Gonçalves 25 October 2007 (has links)
Made available in DSpace on 2016-04-26T20:26:01Z (GMT). No. of bitstreams: 1
Eveline Goncalves Denardi.pdf: 1273620 bytes, checksum: b629ad22a8d78ff35b781616ba4d81b8 (MD5)
Previous issue date: 2007-10-25 / This work starts from the practical experience of the journalist, from the communication theory considering the message (the news), the transmitter (reporter) and the receptor (society) and from the use secrecy of the source in different sides of Journalism in order to analyze the central conflict of this dissertation.
What is the interpretation do Journalism and Law do of the secrecy of the source? The understanding of the journalist takes into account, essentially the rigid ethics of his profession and considers it vital in all fields of Journalism. When he does not act like that, he understands that his work has been distorted. Whereas Law understands it as a constitutional (art.5º, inc.XIV) protection, but also evaluates it from the points of view of the civil law (obligation) and criminal law. The difference of perception between the journalist and the Judiciary Power regarding the secrecy of the source is that it gives origin to the conflicts in the Courts.
Between journalists and their sources it is established a relationship based on trust. The commitment to the silence regarding the origin of the information is established. If the journalist breaks the confidentiality pact, he commits an act of treason which extends to consequences both in the practice of Journalism and in his professional credibility that, in turn, will harm the constitutional right to information in its three aspects: the right to inform, the right of getting informed and the right of being informed.
In Brazil, even if it is possible to notice a tendency of the Judiciary Power to interpret the matter, taking into consideration the importance of the professional ethics, we verify some initiatives of those who consider themselves as victims of such constitutional protection and plead for reporters to reveal their informants in Court.
One of the objectives of this work is to contribute for the best understanding of magistrates, of the journalist and society about the way news is formed. To the Judiciary Power it proposes a reading that, besides considering the juridical aspects of the theme, comprises the importance of the ethical value of that prerogative in Journalism when it ponders the judgment of demands that involve the secrecy of the source.
In this way, we dedicate the first part to the study of the freedom speech in the Federal Constitution, to the right to information and the consequent conflicts between Journalism and personality rights. Next we analyze the international scenario, from similar experiences in Portugal and in the USA. Finally, we have brought in the main questions about the subject matter for the Brazilian reality / Neste trabalho, partimos da experiência prática do jornalista, da teoria da comunicação considerando a mensagem (notícia), o emissor (repórter) e o receptor (sociedade) e do uso imprescindível do sigilo da fonte em diferentes vertentes do Jornalismo para analisar o conflito central dessa dissertação.
Qual a leitura que o Jornalismo e o Direito fazem do sigilo da fonte? O entendimento do jornalista leva em conta essencialmente a ética rígida da sua profissão e a considera imprescindível em todas as áreas do Jornalismo. Quando não age assim, entende que seu trabalho foi deturpado. Já o Direito a compreende como uma proteção constitucional (art.5º, inc.XIV), mas também a avalia dos pontos de vista do direito civil (obrigação) e penal. A diferença de percepção entre o jornalista e o Poder Judiciário a respeito do sigilo da fonte é que dá origem aos conflitos nos Tribunais.
Entre jornalistas e fontes se estabelece uma relação de confiança. É firmado o comprometimento do silêncio quanto à origem da informação. Se o jornalista rompe o pacto de confidencialidade comete ato de traição com extensão de conseqüências na prática do Jornalismo e na sua credibilidade profissional que, por sua vez, irá ferir o direito constitucional à informação em suas três vertentes: o direito de informar, de se informar e de ser informado.
No Brasil, ainda que seja possível perceber uma tendência do Poder Judiciário em ler a questão, considerando a importância da ética profissional, verificamos algumas iniciativas daqueles que se consideram vítimas dessa proteção constitucional, pleiteando para que os repórteres revelem seus informantes nos tribunais.
Um dos objetivos deste trabalho é contribuir para o melhor entendimento dos magistrados, do jornalista e da sociedade sobre a formação da notícia. Ao Poder Judiciário propõe uma leitura que, além de considerar os aspectos jurídicos do tema, compreenda a importância do valor ético dessa prerrogativa no Jornalismo ao ponderar o julgamento das demandas que envolvem o sigilo da fonte.
Nesse caminho, dedicamos a primeira parte ao estudo da liberdade de expressão na Constituição Federal, o direito à informação e os conflitos decorrentes do Jornalismo com os direitos da personalidade. Em seguida, analisamos o cenário internacional, partindo de experiências similares em Portugal e nos EUA. Por fim, trouxemos as principais questões a respeito do assunto para a realidade brasileira
|
174 |
Ochrana lékaře vs. ochrana pacienta / Doctor protection vs. pacient protectionSvobodová, Dominika January 2019 (has links)
Doctor protection vs. patient protection. This diploma thesis deals with the medical law, namely the protection of physicians and the protection of patients, and their mutual comparison as entities standing more or less against each other. The main objective of the thesis was to analyse the protection of both sides; the practical example provides describes a controversial situation which may happen in reality, also gives better understanding of the issue for readers. The aim was to capture the complex and also very extensive legal regulation of the topic, focusing on the touchpoints between the medical and civic laws. In view of the wide range of the topic in question, I consider specifically some sections of the thesis as the most important. At the beginning, the thesis provides a specification of the elementary legislation regulating the medical law. This is not a comprehensive list of resources, due to the enormous extent of the legislation regulating the medical law. Individual chapters describe the topics of informed consent and the protection of personal data, the provision of healthcare without the patient's consent and the special arrangement concerning the consent of underage patients, the relationship between the physician and the patient, the confidentiality duty, previously expressed...
|
175 |
Dissemina??o e prote??o de informa??es no processo de inova??o tecnol?gica: um estudo do contexto regulat?rio aplicado ao caso brasileiroMelhado, Jos? Paulo 19 April 2005 (has links)
Made available in DSpace on 2016-04-04T18:36:24Z (GMT). No. of bitstreams: 1
Jose Paulo Melhado 1.pdf: 1151086 bytes, checksum: 59e50a893f8b1494865193871de36696 (MD5)
Previous issue date: 2005-04-19 / This study investigates the protection and dissemination of technological innovation. Patent concession, technology transfer and secrecy are characterized as instruments of power and are analyzed in terms of the role they play in the Brazilian innovation system. At the present time, the growing economic importance associated with information and knowledge basically attached to the innovation technology by concepts given by Science Information framework is widely acknowledged by those who have power over their production and use, and, consequently, determine which social segments are to have access to innovation. National security and defense-related issues are equally relevant when deciding what must be protected or disseminated. The absorption or dissemination of relevant scientific information and innovation technology may be studied from the standpoint of political and economic alternatives related to the faculty of denying access to knowledge foundations. The methodology applied was based on an analysis of the instruments of power legal support and the ways of denial of acess given by the bibliographic survey. It might conclude that the legal adjustment of these instruments aimed at the intermediation of technology and technology learning and protection is necessary. / O presente estudo trata da prote??o e da dissemina??o da inova??o tecnol?gica com base na concess?o de patentes, na transfer?ncia de tecnologia e no segredo como instrumentos de poder para, em seguida, analis?-los ? luz de seu papel nos sistemas de inova??o, no caso brasileiro. Na atualidade, a crescente import?ncia econ?mica atribu?da ? informa??o e ao conhecimento, elementos essencialmente vinculados ? inova??o tecnol?gica por meio das ferramentas conceituais da Ci?ncia da Informa??o, ? plenamente reconhecida por aqueles que det?m o poder sobre a sua produ??o e uso, de forma a determinar condi??es de acesso ao resultado do esfor?o de inova??o para o restante da sociedade. Quest?es de seguran?a e defesa nacional s?o igualmente relevantes na tomada de decis?o sobre o que deve ser protegido ou disseminado. A absor??o ou a difus?o das informa??es de interesse da ci?ncia, tecnologia e inova??o, enfim, podem ser estudadas sob o foco de alternativas pol?ticas e econ?micas que dizem respeito ? faculdade de negar o acesso ao conhecimento. A metodologia de pesquisa utilizada baseou-se na an?lise do contexto legal dos citados instrumentos, relacionando-os a modos de nega??o de acesso identificados no levantamento bibliogr?fico. Tal aplica??o permitiu concluir pela adequa??o legal desses instrumentos a necessidades urgentes de intermedia??o tecnol?gica, aprendizado tecnol?gico e prote??o da informa??o relacionada ? inova??o.
|
176 |
Tributa????o e Direitos Humanos: direito ?? intimidade versus a quebra do sigilo banc??rio pelo FiscoAlmada, Daiana Ferreira de 15 December 2015 (has links)
Submitted by Kelson Anthony de Menezes (kelson@ucb.br) on 2017-01-10T10:46:17Z
No. of bitstreams: 1
DaianaFerreiradeAlmadaDissertacao2015.pdf: 1483376 bytes, checksum: d2244e7794f69fc313613adf88291e7e (MD5) / Made available in DSpace on 2017-01-10T10:46:17Z (GMT). No. of bitstreams: 1
DaianaFerreiradeAlmadaDissertacao2015.pdf: 1483376 bytes, checksum: d2244e7794f69fc313613adf88291e7e (MD5)
Previous issue date: 2015-12-15 / Taxation and Human Rights are interconnected institutes. The federated beings, when exercising that power, must be guided by Human Rights. The State, which is responsible for safeguarding and promoting them, uses tax revenues to effective them to do so. Sometimes when exercising his empire power it ends up restricting certain rights such as the right to intimacy and to privacy as provided in sections X and XII of art. 5 of the Federal Constitution of 1988. When involving cases related to bank secrecy, which although are not included explicitly in the list of fundamental rights, were recognized by the Supreme Court as a fundamental right and to occur its relativisation it is necessary the authorization of the Judiciary (understanding of the Supreme Court). However the Complementary Law No. 105/2001, in its Articles 5 and 6, brought the prediction of the Tax Administration which has access to taxpayers??? data banking, provided that there is administrative process instituted or tax proceeding in progress, prescription which has turned into a target of some Direct actions of Unconstitutionalities (ADI's), which are open to trial until the present time. We understand that there are no reasons for the Guardian of the Federal Constitution to declare the unconstitutionality of the referred law, given that there isn???t jurisdiction reservation consignment in sections X and XII of art. 5 of the Magna Carta, so that at first the participation of the judiciary would not be mandatory, but the last to be checked in each case, a failure to follow legal requirements or possible abuse of power by of the IRS agents. The right to bank secrecy should not be opposed to the tax authorities, given that the information obtained will be safeguarded by the functional duty, and any abuse will be punished with the rigors of the law. The access to taxpayers??? banking data and the exchange of international information in tax matters have become a very important tool for Tax Administration nowadays. In today's international arena for exchanging information, the Federative Republic of Brazil signed up with the United States an Intergovernmental Agreement for implementing a set of North American standards, known as Foreign Account Tax Compliance Act - FATCA - which amended the Court Code of this country, predicting that financial institutions should send automatically banking information of American account holders to the tax authorities of the country like Brazil has incorporated this Agreement in Brazilian law, it will be left to the Constitution Guardian to determine the subject once it has prevailed in this Court that bank secrecy, except in cases permitted constitutionally, can only be qualified by court order. / Tributa????o e Direitos Humanos s??o institutos interligados. Os entes federados ao exercerem a compet??ncia tribut??ria devem ser norteados pelos Direitos Humanos. O Estado, sendo respons??vel pela tutela e promo????o de tais, utiliza-se da arrecada????o tribut??ria para efetiv??-los, para tanto, ??s vezes ao exercer seu poder de imp??rio acaba por ter que restringir alguns direitos, como ?? o caso do direito ?? intimidade e ?? vida privada, previsto nos incisos X e XII, do art. 5??, da Constitui????o Federal de 1988, quando envolvem casos relacionados com o sigilo banc??rio, que apesar de n??o est?? inclu??do de forma expressa no rol dos direitos fundamentais, foi reconhecido pelo Supremo Tribunal Federal como direito fundamental e, para que ocorra sua relativiza????o, prescinde de autoriza????o do Poder Judici??rio (entendimento do STF). Por??m, a Lei Complementar n?? 105/2001, em seus artigos 5?? e 6??, trouxe a previs??o da Administra????o Tribut??ria tem acesso a dados banc??rios dos contribuintes, desde que exista processo administrativo instaurado ou procedimento fiscal em curso, prescri????o esta que virou alvo de algumas A????es Diretas de Inconstitucionalidades (ADI??s), que encontram-se pendentes de julgamento at?? o presente momento. Entendemos que n??o h?? motivos, para o Guardi??o da Constitui????o Federal, declarar a inconstitucionalidade de referida Lei, tendo em vista que n??o existe nos incisos X e XII, do art. 5??, da Carta Magna, consigna????o de reserva de jurisdi????o, de modo que no primeiro momento, n??o seria obrigat??rio a participa????o do Poder Judici??rio, mas a ??ltima em se verificando, em cada caso concreto, inobserv??ncia dos preceitos legais ou eventuais abuso de poder por parte dos agentes do Fisco. O direito ao sigilo banc??rio, n??o deve ser oposto ?? Administra????o Tribut??ria, tendo em vista que ??s informa????es obtidas, estar??o resguardadas pelo dever funcional, e eventuais abusos, ser??o punidos com os rigores da lei. O acesso aos dados banc??rios dos contribuintes e a troca de informa????es internacionais em mat??ria tribut??rias, tem se tornado, nos dias atuais, uma ferramenta de suma import??ncia ?? Administra????o Tribut??ria. Diante do atual cen??rio internacional de troca de informa????es, a Rep??blica Federativa do Brasil celebrou com os Estados Unidos um Acordo Intergovernamental, para implementar um conjunto de normas norte-americana, conhecida Foreign Account Tax Compliance Act ??? FATCA - que alterou o C??digo Tribunal deste pa??s, prevendo que ??s institui????es financeiras devem encaminhar de forma autom??tica informa????es banc??rias dos correntistas norte-americanos ?? Administra????o Tribut??ria do pa??s, como o Brasil incorporou tal Acordo no direito brasileiro, restar?? ao Guardi??o da Constitui????o se manifestar acerca do assunto, uma vez que, tem prevalecido neste Tribunal, que o sigilo banc??rio, ressalvados os casos permitidos constitucionalmente, apenas pode ser relativizado mediante ordem judicial.
|
177 |
Om rättssäkerheten i instans- och processordningen : ur ett svenskt asylrättsligt perspektivGisslén, Kristofer January 2007 (has links)
<p>Den 1 Mars 2006 ersattes den gamla UtlL (1989:529) av en ny UtlL (2005:716) med stora förändringar i instans- och processordningen. De grundläggande kraven på denna var att öppenheten i asylprocessen skulle öka, att de sökande skulle ges ökade möjligheter till muntlig förhandling vid överklagande av asyl- och medborgarskapsärenden, att processen skulle bestå av en tvåpartsprocess och att instans- och processordningen skulle utformas så att kraven på skyndsam handläggning uppfylldes.</p><p>I denna uppsats har rättssäkerheten för den asylsökande vid prövning av dess asylärende i den nya instans- och processordningen undersökts. Huvudfrågan lyder som följer; säkerställs rättssäkerheten i Sverige för skyddssökande vid prövning av asylärenden i den nya instans- och processordningen?</p><p>Utredning i den här uppsatsen leder till slutsatsen att rättssäkerheten i svensk asylrätt är beroende av att rådande rättsprinciper moderniseras. Offentlighetsprincipen måste tydligare särskiljas från sekretessen. Domstolarna måste beläggas med hårdare sekretesskrav och Migrationsverkets meddelandeskyldighet måste klargöras så att den sökande alltid kan få besked om skälen bakom ett beslut.</p> / <p>On March 1, 2006, the former alien’s act (1989:529) was replaced by a new alien’s act (2005:716) with major changes in the order of authority and the order of process. When the new alien’s act was developed the fundamental requirement in the legislation consisted of an increased openness in the asylum process where the applicants were to be given the possibility to verbal negotiation while appealing asylum and citizenship dossiers. Furthermore the procedure was to be comprised of a two party process and the order of authority and the order of process were to be formulated so that the requirement of rapid processing was met. This essays main issue is; is the legal security ensured for persons seeking asylum in Sweden when investigating their dossiers in the new order of authority and the new order of process?</p><p>The investigation leads to the conclusion that the legal security in the Swedish asylum right is depending on the modernization of prevailing court principles. The principle of free access to official records must be separated from secrecy and stricter demands of secrecy must be imposed on the courts. Finally the Swedish Migration Board's obligation to keep the applicants informed of the reasons behind a decision must be clarified.</p>
|
178 |
Om rättssäkerheten i instans- och processordningen : ur ett svenskt asylrättsligt perspektivGisslén, Kristofer January 2007 (has links)
Den 1 Mars 2006 ersattes den gamla UtlL (1989:529) av en ny UtlL (2005:716) med stora förändringar i instans- och processordningen. De grundläggande kraven på denna var att öppenheten i asylprocessen skulle öka, att de sökande skulle ges ökade möjligheter till muntlig förhandling vid överklagande av asyl- och medborgarskapsärenden, att processen skulle bestå av en tvåpartsprocess och att instans- och processordningen skulle utformas så att kraven på skyndsam handläggning uppfylldes. I denna uppsats har rättssäkerheten för den asylsökande vid prövning av dess asylärende i den nya instans- och processordningen undersökts. Huvudfrågan lyder som följer; säkerställs rättssäkerheten i Sverige för skyddssökande vid prövning av asylärenden i den nya instans- och processordningen? Utredning i den här uppsatsen leder till slutsatsen att rättssäkerheten i svensk asylrätt är beroende av att rådande rättsprinciper moderniseras. Offentlighetsprincipen måste tydligare särskiljas från sekretessen. Domstolarna måste beläggas med hårdare sekretesskrav och Migrationsverkets meddelandeskyldighet måste klargöras så att den sökande alltid kan få besked om skälen bakom ett beslut. / On March 1, 2006, the former alien’s act (1989:529) was replaced by a new alien’s act (2005:716) with major changes in the order of authority and the order of process. When the new alien’s act was developed the fundamental requirement in the legislation consisted of an increased openness in the asylum process where the applicants were to be given the possibility to verbal negotiation while appealing asylum and citizenship dossiers. Furthermore the procedure was to be comprised of a two party process and the order of authority and the order of process were to be formulated so that the requirement of rapid processing was met. This essays main issue is; is the legal security ensured for persons seeking asylum in Sweden when investigating their dossiers in the new order of authority and the new order of process? The investigation leads to the conclusion that the legal security in the Swedish asylum right is depending on the modernization of prevailing court principles. The principle of free access to official records must be separated from secrecy and stricter demands of secrecy must be imposed on the courts. Finally the Swedish Migration Board's obligation to keep the applicants informed of the reasons behind a decision must be clarified.
|
179 |
User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model CheckingLin, Yi-Hui 12 September 2012 (has links)
Authentication protocols are used for two parties to authenticate each other and build a secure channel over wired or wireless public channels. However, the present standards of authentication protocols are either insufficiently secure or inefficient for light weight devices. Therefore, we propose two authentication protocols for improving the security and user efficiency
in wired and wireless environments, respectively.
Traditionally, TLS/SSL is the standard of authentication and key exchange protocols in wired Internet. It is known that the security of TLS/SSL is not enough due to all sorts of client side attacks. To amend the client side security, multi-factor authentication is an effective solution. However, this solution brings about the issue of biometric privacy which raises public concern of revealing biometric data to an authentication server. Therefore, we propose a truly three factor authentication protocol, where the authentication server can verify their biometric data without the knowledge of users¡¦ templates and samples.
In the major wireless technologies, extensible Authentication Protocol (EAP) is an authentication
framework widely used in IEEE 802.11 WLANs. Authentication mechanisms built on EAP are called EAP methods. The requirements for EAP methods in WLANs authentication have been defined in RFC 4017. To achieve user efficiency and robust security, lightweight computation and forward secrecy, excluded in RFC 4017, are desired in WLAN authentication.
However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the above properties. We will present a complete EAP method that utilizes stored secrets and passwords to verify users so that it can (1) meet the requirements of RFC 4017, (2) provide lightweight computation, and (3) allow for forward secrecy.
In order to prove our proposed protocols completely, we apply two different models to examine their security properties: Bellare¡¦s model, a standard reduction based on computational model, that reduces the security properties to the computationally hard problems and the OFMC/AVISPA tool, a model checking approach based on formal model, that uses the concept of the search tree to systematically find the weaknesses of a protocol. Through adopting Bellare¡¦s model and OFMC/AVISPA tool, the security of our work is firmly established.
|
180 |
Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State InformationEngelmann, Sabrina 24 August 2015 (has links) (PDF)
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI.
We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability.
For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied. / In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind.
Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren.
Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte.
|
Page generated in 0.0628 seconds