Spelling suggestions: "subject:"tamperingresistance"" "subject:"hyperresistance""
1 |
Ceramic Materials for Administration of Potent DrugsCai, Bing January 2015 (has links)
This thesis aimed to investigate and document the potential of applying ceramics in two specific drug delivery applications: tamper-resistant opioid formulations and transdermal enhancement protrusions. Geopolymers were developed into the matrix for a tamper-resistant formulation, aiming to protect drug substances from non-medical abuse. The synthesis conditions and excipients composition of the geopolymer-based formulation were modified in this work to facilitate a stable and extended drug delivery. Results showed that 37ºC 100% humidity for 48 hours were applicable conditions to obtain geopolymer with suitable mechanical strength and porosity. Moreover, it was found that the integration of poly(methyl acrylate) into the geopolymer-based formulation could reduce the drug release at low pH and, meanwhile, maintain the mechanical strength. Therefore, the geopolymer-based drug formulations concluded from these studies were applied in oral and transdermal delivery systems. Evidence of the tamper-resistance of geopolymer-based oral and transdermal formulations was documented and compared to the corresponding commercial opioid formulations. The results provided experimental support for the positive effects of geopolymers as drug carriers for the tamper-resistance of oral and transdermal delivery systems. Self-setting bioceramics, calcium phosphate and calcium sulfate were fabricated into transdermal enhancement protrusions in this work for the first time. Results showed that, under mild conditions, both bioceramics could form pyramid-shaped needles in the micron size. The drug release from these needles could be controlled by the bulk surface area, porosity and degradation of the bioceramics. An in vitro insertion test showed that the bioceramic microneedles had enough mechanical strength to insert into skin. Further optimization on the geometry of needles and the substrate material was also performed. The higher aspect-ratio needles with a flexible and self-swellable substrate could release most of the drug content within 4 hours and could penetrate through the stratum corneum by manual insertion. This study explored the potential application of bioceramics in transdermal enhancement protrusions and showed promising indication of their future developments.
|
2 |
Enhancing security in distributed systems with trusted computing hardwareReid, Jason Frederick January 2007 (has links)
The need to increase the hostile attack resilience of distributed and internet-worked computer systems is critical and pressing. This thesis contributes to concrete improvements in distributed systems trustworthiness through an enhanced understanding of a technical approach known as trusted computing hardware. Because of its physical and logical protection features, trusted computing hardware can reliably enforce a security policy in a threat model where the authorised user is untrusted or when the device is placed in a hostile environment.
We present a critical analysis of vulnerabilities in current systems, and argue that current industry-driven trusted computing initiatives will fail in efforts to retrofit security into inherently flawed operating system designs, since there is no substitute for a sound protection architecture grounded in hardware-enforced domain isolation. In doing so we identify the limitations of hardware-based approaches. We argue that the current emphasis of these programs does not give sufficient weight to the role that operating system security plays in overall system security. New processor features that provide hardware support for virtualisation will contribute more to practical security improvement because they will allow multiple operating systems to concurrently share the same processor. New operating systems that implement a sound protection architecture will thus be able to be introduced to support applications with stringent security requirements. These can coexist alongside inherently less secure mainstream operating systems, allowing a gradual migration to less vulnerable alternatives.
We examine the effectiveness of the ITSEC and Common Criteria evaluation and certification schemes as a basis for establishing assurance in trusted computing hardware. Based on a survey of smart card certifications, we contend that the practice of artificially limiting the scope of an evaluation in order to gain a higher assurance rating is quite common. Due to a general lack of understanding in the marketplace as to how the schemes work, high evaluation assurance levels are confused with a general notion of 'high security strength'. Vendors invest little effort in correcting the misconception since they benefit from it and this has arguably undermined the value of the whole certification process.
We contribute practical techniques for securing personal trusted hardware devices against a type of attack known as a relay attack. Our method is based on a novel application of a phenomenon known as side channel leakage, heretofore considered exclusively as a security vulnerability. We exploit the low latency of side channel information transfer to deliver a communication channel with timing resolution that is fine enough to detect sophisticated relay attacks. We avoid the cost and complexity associated with alternative communication techniques suggested in previous proposals. We also propose the first terrorist attack resistant distance bounding protocol that is efficient enough to be implemented on resource constrained devices.
We propose a design for a privacy sensitive electronic cash scheme that leverages the confidentiality and integrity protection features of trusted computing hardware. We specify the command set and message structures and implement these in a prototype that uses Dallas Semiconductor iButtons.
We consider the access control requirements for a national scale electronic health records system of the type that Australia is currently developing. We argue that an access control model capable of supporting explicit denial of privileges is required to ensure that consumers maintain their right to grant or withhold consent to disclosure of their sensitive health information in an electronic system. Finding this feature absent in standard role-based access control models, we propose a modification to role-based access control that supports policy constructs of this type. Explicit denial is difficult to enforce in a large scale system without an active central authority but centralisation impacts negatively on system scalability. We show how the unique properties of trusted computing hardware can address this problem. We outline a conceptual architecture for an electronic health records access control system that leverages hardware level CPU virtualisation, trusted platform modules, personal cryptographic tokens and secure coprocessors to implement role based cryptographic access control. We argue that the design delivers important scalability benefits because it enables access control decisions to be made and enforced locally on a user's computing platform in a reliable way.
|
Page generated in 0.0478 seconds