A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-11-17
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-01-01
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael
2016-03-11
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length.
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things
Garcia-Carrillo, Dan; Marin-Lopez, Rafael
2016-01-01
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length. PMID:26978362
Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
2015-01-01
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment. PMID:25738767
Opportunistic mobility support for resource constrained sensor devices in smart cities.
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
2015-03-02
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.
NASA Astrophysics Data System (ADS)
Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio
2017-08-01
We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).
Honing EAP Learners' Public Speaking Skills by Analyzing TED Talks
ERIC Educational Resources Information Center
Leopold, Lisa
2016-01-01
Despite the importance of public speaking skills for English for Academic Purposes (EAP) students' academic and professional success, few EAP textbooks incorporate authentic, professional speech models. Thus, many EAP instructors have turned to TED talks for dynamic speech models. Yet a single TED talk may be too long for viewing in class and may…
ERIC Educational Resources Information Center
Atai, Mahmood Reza; Nazari, Ogholgol
2011-01-01
Discipline-based English for Academic Purposes (EAP) reading programs in Iran are designed to fill the gap between the students' general English reading competence and their ability to read authentic discipline-specific texts. This study attempted to assess target and present reading comprehension needs of EAP students of Health Information…
Learner Corpora: The Missing Link in EAP Pedagogy
ERIC Educational Resources Information Center
Gilquin, Gaetanelle; Granger, Sylviane; Paquot, Magali
2007-01-01
This article deals with the place of learner corpora, i.e. corpora containing authentic language data produced by learners of a foreign/second language, in English for academic purposes (EAP) pedagogy and sets out to demonstrate that they have a valuable contribution to make to the field. Following an initial brief introduction to corpus-based…
Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management
NASA Astrophysics Data System (ADS)
Sridevi, B.; Sivaranjani, S.; Rajaram, S.
2013-01-01
In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and backed by MATLAB for processing and MYSQL for storing keys.
Where Good Pedagogical Ideas Come From: The Story of an EAP Task
ERIC Educational Resources Information Center
Light, Justine; Ranta, Leila
2016-01-01
Teachers using a task-based language teaching (TBLT) approach are always searching for learning tasks that have the potential to prepare learners for the real world. In this article, we describe how an authentic academic assignment for graduate students in a teaching English as a second language (TESL) course was transformed into a task-based…
FBI's Employee Assistance Program: an advanced law enforcement model.
McNally, V J
1999-01-01
As we approach the 21st century the FBI has enhanced its Employee Assistance Program (EAP) to include EAP services, Peer Support and Critical Incident Stress Management/Debriefing (CISM/D) and Chaplains' Program. This EAP is now anticipating the future to include a Compassion Fatigue Program for its counselors and coordinators, as well as developing CISD protocols for incidents involving weapons of mass destruction. As the FBI has accepted new challenges in the investigative arena throughout the world, so the FBI's Employee Assistance and related programs have set out to support their employees and family members with a continuum of integrated confidential services. The FBI recognizes that its most important asset is its personnel, and EAP is the vehicle to assist the FBI family in remaining healthy and strong for the continuous quest to fulfill its mission.
An Authentication Protocol for Future Sensor Networks.
Bilal, Muhammad; Kang, Shin-Gak
2017-04-28
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
An Authentication Protocol for Future Sensor Networks
Bilal, Muhammad; Kang, Shin-Gak
2017-01-01
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
NASA Astrophysics Data System (ADS)
Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.
Zhao, Zhenguo
2014-05-01
With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.
Palankar, Raghavendra; Binsker, Ulrike; Haracska, Bianca; Wesche, Jan; Greinacher, Andreas; Hammerschmidt, Sven
2018-04-18
S. aureus associated bacteremia can lead to severe infections with high risk of mortality (e.g. sepsis, infective endocarditis). Many virulence factors and adhesins of S. aureus are known to directly interact with platelets. Extracellular adherence protein, Eap, one of the most important virulence factors in S. aureus mediated infections is a multi-tandem domain protein and has been shown to interact with almost all cell types in the human circulatory system. By using amine reactive fluorescent N-hydroxysuccinimidyl (NHS)-ester dyes and by direct detection with primary fluorescently conjugated anti-histidine (His-tag) antibodies against detect N-terminal His6, we show Eap subdomain Eap D 3 D 4 specifically interacts and rapidly activates human platelets. Furthermore, we validate our finding by using site directed directional immobilization of Eap D 3 D 4 through N-terminal His 6 on nickel (II)-nitrilotriacetic acid (Ni-NTA) functionalized bacteriomimetic microbead arrays to visualize real-time platelet activation through calcium release assay. These methods offer an easily adoptable protocols for screening of S.aureus derived virulence factors and adhesins with platelets. Copyright © 2018 Elsevier GmbH. All rights reserved.
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
Efficient model checking of network authentication protocol based on SPIN
NASA Astrophysics Data System (ADS)
Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan
2013-03-01
Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.
NASA Astrophysics Data System (ADS)
Amerimehr, Ali; Hadain Dehkordi, Massoud
2018-03-01
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Secure authentication protocol for Internet applications over CATV network
NASA Astrophysics Data System (ADS)
Chin, Le-Pond
1998-02-01
An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
2015-06-01
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
Zhang, Zezhong; Qi, Qingqing
2014-05-01
Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
Authenticated Quantum Key Distribution with Collective Detection using Single Photons
NASA Astrophysics Data System (ADS)
Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue
2016-10-01
We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.
2017-11-22
Acute Lymphoblastic Leukemia; Acute Myeloid Leukemia; Chronic Myeloid Leukemia; Myelodysplastic Syndrome; Lymphomas; Bone Marrow Failure; Hemoglobinopathy; Immune Deficiency; Osteopetrosis; Cytopenias; Leukocyte Disorders; Anemia Due to Intrinsic Red Cell Abnormality
Analysis of MD5 authentication in various routing protocols using simulation tools
NASA Astrophysics Data System (ADS)
Dinakaran, M.; Darshan, K. N.; Patel, Harsh
2017-11-01
Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.
Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng
2018-04-01
With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated. Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks. The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS. We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga
2016-10-01
Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
Amin, Ruhul; Biswas, G P
2015-08-01
Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
On Robust Key Agreement Based on Public Key Authentication
NASA Astrophysics Data System (ADS)
Hao, Feng
We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining
2015-03-01
Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Yang, Li; Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.
Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085
Advanced information processing system: Authentication protocols for network communication
NASA Technical Reports Server (NTRS)
Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.
1994-01-01
In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.
A secure RFID authentication protocol adopting error correction code.
Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
A Secure RFID Authentication Protocol Adopting Error Correction Code
Zheng, Xinying; Chen, Pei-Yu
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619
Authenticated multi-user quantum key distribution with single particles
NASA Astrophysics Data System (ADS)
Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen
2016-03-01
Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.
Efficient authentication scheme based on near-ring root extraction problem
NASA Astrophysics Data System (ADS)
Muthukumaran, V.; Ezhilmaran, D.
2017-11-01
An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2017-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2016-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
2015-01-01
on AFRL’s small unmanned aerial vehicle (UAV) test bed . 15. SUBJECT TERMS Zero-Knowledge Proof Protocol Testing 16. SECURITY CLASSIFICATION OF...VERIFIER*** edition Version Information: Version 1.1.3 Version Details: Successful ZK authentication between two networked machines. Fixed a bug ...that causes intermittent bignum errors. Fixed a network hang bug and now allows continually authentication at the Verifier. Also now removing
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
Identity-Based Authentication for Cloud Computing
NASA Astrophysics Data System (ADS)
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
Comment on 'Quantum direct communication with authentication'
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Zhan-jun; Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039; Liu, Jun
2007-02-15
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. Asmore » a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.« less
NASA Astrophysics Data System (ADS)
Fathirad, Iraj; Devlin, John; Jiang, Frank
2012-09-01
The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.
A Hybrid Authentication and Authorization Process for Control System Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.
2010-08-25
Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less
Authenticated communication from quantum readout of PUFs
NASA Astrophysics Data System (ADS)
Škorić, Boris; Pinkse, Pepijn W. H.; Mosk, Allard P.
2017-08-01
Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.
Hartwell, T D; Steele, P; French, M T; Potter, F J; Rodman, N F; Zarkin, G A
1996-06-01
Employee assistance programs (EAPs) are job-based programs designed to identify and assist troubled employees. This study determines the prevalence, cost, and characteristics of these programs in the United States by worksite size, industry, and census region. A stratified national probability sample of more than 6400 private, nonagricultural US worksites with 50 or more full-time employees was contacted with a computer-assisted telephone interviewing protocol. More than 3200 worksites responded and were eligible, with a response rate of 90%. Approximately 33% of all private, nonagricultural worksites with 50 or more full-time employees currently offer EAP services to their employees, an 8.9% increase over 1985. These programs are more likely to be found in larger worksites and in the communications/utilities/transportation industries. The most popular model is an external provider, and the median annual cost per eligible employee for internal and external programs was $21.83 and $18.09, respectively. EAPs are becoming a more prevalent point of access to health care for workers with personal problems such as substance abuse, family problems, or emotional distress.
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk
2014-10-01
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
NASA Astrophysics Data System (ADS)
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.
2018-04-01
Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.
Server-Controlled Identity-Based Authenticated Key Exchange
NASA Astrophysics Data System (ADS)
Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun
We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
New Results on Unconditionally Secure Multi-receiver Manual Authentication
NASA Astrophysics Data System (ADS)
Wang, Shuhong; Safavi-Naini, Reihaneh
Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.
A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security
Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif
2008-01-01
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963
A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.
Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif
2008-12-04
This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.
The effect of an enhanced employee assistance program (EAP) intervention on EAP utilization.
Zarkin, G A; Bray, J W; Karuntzos, G T; Demiralp, B
2001-05-01
An enhanced employee assistance program (EAP) intervention was developed that delivers comprehensive EAP outreach services to all employees who may have alcohol-related and other workplace problems; standard EAP materials traditionally targeted at white men were enhanced to include women and minorities. This study evaluates whether the enhanced EAP intervention increased EAP utilization. The enhanced EAP intervention was developed at a large community-based not-for-profit EAP located in Rockford, Illinois. Two primary worksites and 16 other newly contracted worksites received the enhanced EAP intervention and served as intervention sites; the 107 other worksites serviced by the EAP were used as comparison sites. We used time series data from 1991 to 1998 and included repeated measures on each firm's quarterly EAP utilization. The enhanced EAP intervention increased the mean number of women and minority cases per worksite by 58%, white male cases by 45% and total EAP cases by 53%. This study shows that, for a modest cost, the enhanced EAP intervention successfully increased utilization of EAP by all employees, especially utilization by women and minority employees. It also shows that traditional EAP services and outreach materials can be made more appealing to women and minorities without adversely affecting their utilization by white men.
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
Remote object authentication: confidence model, cryptosystem and protocol
NASA Astrophysics Data System (ADS)
Lancrenon, Jean; Gillard, Roland; Fournel, Thierry
2009-04-01
This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
A covert authentication and security solution for GMOs.
Mueller, Siguna; Jafari, Farhad; Roth, Don
2016-09-21
Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.
Protocols development for security and privacy of radio frequency identification systems
NASA Astrophysics Data System (ADS)
Sabbagha, Fatin
There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.
A Secure Authenticated Key Exchange Protocol for Credential Services
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.
Hartwell, T D; Steele, P; French, M T; Potter, F J; Rodman, N F; Zarkin, G A
1996-01-01
OBJECTIVES: Employee assistance programs (EAPs) are job-based programs designed to identify and assist troubled employees. This study determines the prevalence, cost, and characteristics of these programs in the United States by worksite size, industry, and census region. METHODS: A stratified national probability sample of more than 6400 private, nonagricultural US worksites with 50 or more full-time employees was contacted with a computer-assisted telephone interviewing protocol. More than 3200 worksites responded and were eligible, with a response rate of 90%. RESULTS: Approximately 33% of all private, nonagricultural worksites with 50 or more full-time employees currently offer EAP services to their employees, an 8.9% increase over 1985. These programs are more likely to be found in larger worksites and in the communications/utilities/transportation industries. The most popular model is an external provider, and the median annual cost per eligible employee for internal and external programs was $21.83 and $18.09, respectively. CONCLUSIONS: EAPs are becoming a more prevalent point of access to health care for workers with personal problems such as substance abuse, family problems, or emotional distress. PMID:8659653
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...
NASA Astrophysics Data System (ADS)
Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao
2016-08-01
A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
2006-01-01
based approach. In this paper, we propose a symmetric key-based protocol for authenticating the reprogramming process. Our protocol is based on the ... secret instantiation algorithm, which requires only O(log n) keys to be maintained at each sensor. We integrate this algorithm with the existing
Authentication Binding between SSL/TLS and HTTP
NASA Astrophysics Data System (ADS)
Saito, Takamichi; Sekiguchi, Kiyomi; Hatsugai, Ryosuke
While the Secure Socket Layer or Transport Layer Security (SSL/TLS) is assumed to provide secure communications over the Internet, many web applications utilize basic or digest authentication of Hyper Text Transport Protocol (HTTP) over SSL/TLS. Namely, in the scheme, there are two different authentication schemes in a session. Since they are separated by a layer, these are not convenient for a web application. Moreover, the scheme may also cause problems in establishing secure communication. Then we provide a scheme of authentication binding between SSL/TLS and HTTP without modifying SSL/TLS protocols and its implementation, and we show the effectiveness of our proposed scheme.
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.
Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo
2015-01-01
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
[Employee assistance program].
Shima, Satoru; Tanaka, Katsutoshi; Ohba, Sayo
2002-03-01
Recently the EAP has received much attention in Japan. The first EAP service in the US was conducted by employees who had recovered from alcohol problems. In the early days EAP providers focused on addiction, but mainly after 1980 they expanded their service areas to include mental health, marital problems, legal problems and financial problems. In Japan the EAP was first received attention as a counseling resource outside the workplace where employees could seek professional help confidentially, but the main reasons why this system now interests employers are as a risk-management tool and an outsourcing of mental health services, since the growing number of mental health cases in the workplace has been a big issue for employers. Two movements have also contributed to more recognition of the EAP: one is guidelines on compensation for mental health cases in the workplace and the other is guidelines on mental health promotion in the workplace. There are four types of EAP systems: internal EAP, external EAP, combination EAP, and consortium EAP. EAP core technology consists of 8 functions including problem identification, Crisis intervention, Short-term intervention, Consultation with work organization leader. The literature on cost-benefit analysis of the EAP is very limited. Although the available data suggest that the EAP is highly cost-effective, further studies are needed with the sufficient statistical quality. In Japan the most important issues in the EAP are the standardization and quality assurance of EAP services. For this purpose development of a good educational system for EAP professionals is needed.
Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks
NASA Astrophysics Data System (ADS)
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
2017-10-01
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Analysis of Counterfactual Quantum Certificate Authorization
NASA Astrophysics Data System (ADS)
Wang, Tian-Yin; Li, Yan-Ping; Zhang, Rui-Ling
2016-12-01
A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89, 052307 (20)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.
Stapels, Daphne A C; Woehl, Jordan L; Milder, Fin J; Tromp, Angelino T; van Batenburg, Aernoud A; de Graaf, Wilco C; Broll, Samuel C; White, Natalie M; Rooijakkers, Suzan H M; Geisbrecht, Brian V
2018-02-01
Neutrophils contain high levels of chymotrypsin-like serine proteases (NSPs) within their azurophilic granules that have a multitude of functions within the immune system. In response, the pathogen Staphylococcus aureus has evolved three potent inhibitors (Eap, EapH1, and EapH2) that protect the bacterium as well as several of its secreted virulence factors from the degradative action of NSPs. We previously showed that these so-called EAP domain proteins represent a novel class of NSP inhibitors characterized by a non-covalent inhibitory mechanism and a distinct target specificity profile. Based upon high levels of structural homology amongst the EAP proteins and the NSPs, as well as supporting biochemical data, we predicted that the inhibited complex would be similar for all EAP/NSP pairs. However, we present here evidence that EapH1 and EapH2 bind the canonical NSP, Neutrophil Elastase (NE), in distinct orientations. We discovered that alteration of EapH1 residues at the EapH1/NE interface caused a dramatic loss of affinity and inhibition of NE, while mutation of equivalent positions in EapH2 had no effect on NE binding or inhibition. Surprisingly, mutation of residues in an altogether different region of EapH2 severely impacted both the NE binding and inhibitory properties of EapH2. Even though EapH1 and EapH2 bind and inhibit NE and a second NSP, Cathepsin G, equally well, neither of these proteins interacts with the structurally related, but non-proteolytic granule protein, azurocidin. These studies expand our understanding of EAP/NSP interactions and suggest that members of this immune evasion protein family are capable of diverse target recognition modes. © 2017 The Protein Society.
Hammel, Michal; Nemecek, Daniel; Keightley, J Andrew; Thomas, George J; Geisbrecht, Brian V
2007-12-01
The extracellular adherence protein (Eap) of Staphylococcus aureus participates in a wide range of protein-protein interactions that facilitate the initiation and dissemination of Staphylococcal disease. In this report, we describe the use of a multidisciplinary approach to characterize the solution structure of full-length Eap. In contrast to previous reports suggesting that a six-domain isoform of Eap undergoes multimerization, sedimentation equilibrium analytical ultracentrifugation data revealed that a four-domain isoform of Eap is a monomer in solution. In vitro proteolysis and solution small angle X-ray scattering studies both indicate that Eap adopts an extended conformation in solution, where the linkers connecting sequential EAP modules are solvent exposed. Construction of a low-resolution model of full-length Eap using a combination of ab initio deconvolution of the SAXS data and rigid body modeling of the EAP domain crystal structure suggests that full-length Eap may present several unique concave surfaces capable of participating in ligand binding. These results also raise the possibility that such surfaces may be held together by additional interactions between adjacent EAP modules. This hypothesis is supported by a comparative Raman spectroscopic analysis of full-length Eap and a stoichiometric solution of the individual EAP modules, which indicates the presence of additional secondary structure and a greater extent of hydrogen/deuterium exchange protection in full-length Eap. Our results provide the first insight into the solution structure of full-length Eap and an experimental basis for interpreting the EAP domain crystal structures within the context of the full-length molecule. They also lay a foundation for future studies into the structural and molecular bases of Eap-mediated protein-protein interactions with its many ligands.
Delaney, W; Grube, J W; Ames, G M
1998-03-01
This research investigated belief, social support and background predictors of employee likelihood to use an Employee Assistance Program (EAP) for a drinking problem. An anonymous cross-sectional survey was administered in the home. Bivariate analyses and simultaneous equations path analysis were used to explore a model of EAP use. Survey and ethnographic research were conducted in a unionized heavy machinery manufacturing plant in the central states of the United States. A random sample of 852 hourly and salaried employees was selected. In addition to background variables, measures included: likelihood of going to an EAP for a drinking problem, belief the EAP can help, social support for the EAP from co-workers/others, belief that EAP use will harm employment, and supervisor encourages the EAP for potential drinking problems. Belief in EAP efficacy directly increased the likelihood of going to an EAP. Greater perceived social support and supervisor encouragement increased the likelihood of going to an EAP both directly and indirectly through perceived EAP efficacy. Black and union hourly employees were more likely to say they would use an EAP. Males and those who reported drinking during working hours were less likely to say they would use an EAP for a drinking problem. EAP beliefs and social support have significant effects on likelihood to go to an EAP for a drinking problem. EAPs may wish to focus their efforts on creating an environment where there is social support from coworkers and encouragement from supervisors for using EAP services. Union networks and team members have an important role to play in addition to conventional supervisor intervention.
Hammel, Michal; Němeček, Daniel; Keightley, J. Andrew; Thomas, George J.; Geisbrecht, Brian V.
2007-01-01
The extracellular adherence protein (Eap) of Staphylococcus aureus participates in a wide range of protein–protein interactions that facilitate the initiation and dissemination of Staphylococcal disease. In this report, we describe the use of a multidisciplinary approach to characterize the solution structure of full-length Eap. In contrast to previous reports suggesting that a six-domain isoform of Eap undergoes multimerization, sedimentation equilibrium analytical ultracentrifugation data revealed that a four-domain isoform of Eap is a monomer in solution. In vitro proteolysis and solution small angle X-ray scattering studies both indicate that Eap adopts an extended conformation in solution, where the linkers connecting sequential EAP modules are solvent exposed. Construction of a low-resolution model of full-length Eap using a combination of ab initio deconvolution of the SAXS data and rigid body modeling of the EAP domain crystal structure suggests that full-length Eap may present several unique concave surfaces capable of participating in ligand binding. These results also raise the possibility that such surfaces may be held together by additional interactions between adjacent EAP modules. This hypothesis is supported by a comparative Raman spectroscopic analysis of full-length Eap and a stoichiometric solution of the individual EAP modules, which indicates the presence of additional secondary structure and a greater extent of hydrogen/deuterium exchange protection in full-length Eap. Our results provide the first insight into the solution structure of full-length Eap and an experimental basis for interpreting the EAP domain crystal structures within the context of the full-length molecule. They also lay a foundation for future studies into the structural and molecular bases of Eap-mediated protein–protein interactions with its many ligands. PMID:18029416
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-01-01
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-05-19
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.
NASA Astrophysics Data System (ADS)
Zhu, Lijuan; Liu, Jingao
2013-07-01
This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.
Employee Attitudes toward an Internal Employee Assistance Program.
ERIC Educational Resources Information Center
Harlow, Kirk C.
1998-01-01
Surveys employees (N=16,603) who had used a large multinational company's employee assistance program (EAP), adult dependents who had used the EAP, employees who had not used the EAP, and adult dependents who had not used the EAP. Findings indicate that EAP users viewed the EAP more positively than nonusers. (Author/MKA)
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V.
2016-01-01
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. PMID:27023540
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V
2016-03-24
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147
Nonnegative definite EAP and ODF estimation via a unified multi-shell HARDI reconstruction.
Cheng, Jian; Jiang, Tianzi; Deriche, Rachid
2012-01-01
In High Angular Resolution Diffusion Imaging (HARDI), Orientation Distribution Function (ODF) and Ensemble Average Propagator (EAP) are two important Probability Density Functions (PDFs) which reflect the water diffusion and fiber orientations. Spherical Polar Fourier Imaging (SPFI) is a recent model-free multi-shell HARDI method which estimates both EAP and ODF from the diffusion signals with multiple b values. As physical PDFs, ODFs and EAPs are nonnegative definite respectively in their domains S2 and R3. However, existing ODF/EAP estimation methods like SPFI seldom consider this natural constraint. Although some works considered the nonnegative constraint on the given discrete samples of ODF/EAP, the estimated ODF/EAP is not guaranteed to be nonnegative definite in the whole continuous domain. The Riemannian framework for ODFs and EAPs has been proposed via the square root parameterization based on pre-estimated ODFs and EAPs by other methods like SPFI. However, there is no work on how to estimate the square root of ODF/EAP called as the wavefuntion directly from diffusion signals. In this paper, based on the Riemannian framework for ODFs/EAPs and Spherical Polar Fourier (SPF) basis representation, we propose a unified model-free multi-shell HARDI method, named as Square Root Parameterized Estimation (SRPE), to simultaneously estimate both the wavefunction of EAPs and the nonnegative definite ODFs and EAPs from diffusion signals. The experiments on synthetic data and real data showed SRPE is more robust to noise and has better EAP reconstruction than SPFI, especially for EAP profiles at large radius.
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo
2015-01-01
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714
Quantum secret sharing with identity authentication based on Bell states
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
The effect of Employee Assistance Programs use on healthcare utilization.
Zarkin, G A; Bray, J W; Qi, J
2000-04-01
To estimate the effect of Employee Assistance Program (EAP) use on healthcare utilization as measured by health claims. A unique data set that combines individual-level information on EAP utilization, demographic information, and health insurance claims from 1991 to 1995 for all employees of a large midwestern employer. Using "fixed-effect" econometric models that control for unobserved differences between individuals' propensities to use healthcare resources and the EAP, we perform our analyses in two steps. First, for those employees who visited the EAP, we test whether post-EAP claims differ from pre-EAP claims. Second, we combine claims data of individuals who went to an EAP with those of individuals who did not use an EAP to test whether differences in utilization exist between EAP users and nonusers. From the EAP we obtained the date of first EAP contact for all employees who used the service, and from the company's human resources department we obtained limited demographic data on all employees. We obtained healthcare utilization claims data on all employees and their dependents from the company's two healthcare plans: a fee-for-service (FFS) plan and a health maintenance organization (HMO) plan. We found that going to an EAP substantially increases both the probability of an alcohol, drug abuse, or mental health (ADM) claim and the number of ADM claims in the same quarter as EAP contact. The increased probability of an ADM claim persists for approximately 11 quarters after the initial contact, while the increased ADM charges persist for approximately six quarters after the initial EAP contact. Our results strongly suggest that the EAP is able to identify behavioral and other health problems that may affect workplace performance and prompt EAP users to access ADM and other healthcare. Consistent with the stated goals of many EAPs, including the one examined in this study, this process should improve individuals' health, family functioning, and workplace performance.
The effect of Employee Assistance Programs use on healthcare utilization.
Zarkin, G A; Bray, J W; Qi, J
2000-01-01
OBJECTIVE: To estimate the effect of Employee Assistance Program (EAP) use on healthcare utilization as measured by health claims. DATA SOURCES: A unique data set that combines individual-level information on EAP utilization, demographic information, and health insurance claims from 1991 to 1995 for all employees of a large midwestern employer. STUDY DESIGN: Using "fixed-effect" econometric models that control for unobserved differences between individuals' propensities to use healthcare resources and the EAP, we perform our analyses in two steps. First, for those employees who visited the EAP, we test whether post-EAP claims differ from pre-EAP claims. Second, we combine claims data of individuals who went to an EAP with those of individuals who did not use an EAP to test whether differences in utilization exist between EAP users and nonusers. DATA COLLECTION METHODS: From the EAP we obtained the date of first EAP contact for all employees who used the service, and from the company's human resources department we obtained limited demographic data on all employees. We obtained healthcare utilization claims data on all employees and their dependents from the company's two healthcare plans: a fee-for-service (FFS) plan and a health maintenance organization (HMO) plan. PRINCIPAL FINDINGS: We found that going to an EAP substantially increases both the probability of an alcohol, drug abuse, or mental health (ADM) claim and the number of ADM claims in the same quarter as EAP contact. The increased probability of an ADM claim persists for approximately 11 quarters after the initial contact, while the increased ADM charges persist for approximately six quarters after the initial EAP contact. CONCLUSIONS: Our results strongly suggest that the EAP is able to identify behavioral and other health problems that may affect workplace performance and prompt EAP users to access ADM and other healthcare. Consistent with the stated goals of many EAPs, including the one examined in this study, this process should improve individuals' health, family functioning, and workplace performance. PMID:10778825
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks
Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony
2016-01-01
Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.
Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony
2016-04-22
Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.
ERIC Educational Resources Information Center
Levine, Hermine Zagat
1985-01-01
The author reports company responses to a questionnaire concerning employee assistance programs (EAP). Answers concern EAP structure, staff training, use of outside consultant, services provided by EAPs, program administration, employee confidence in EAPs, advertising the program, program philosophy, problems encountered by EAP users, coverage and…
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
NASA Astrophysics Data System (ADS)
Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang
In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Merrick, Elizabeth S Levy; Volpe-Vartanian, Joanna; Horgan, Constance M; McCann, Bernard
2007-10-01
This column describes employee assistance program (EAPs) and identifies key issues for contemporary EAPs. These programs began as occupational alcohol programs and have evolved into more comprehensive resources. To better understand contemporary EAPs, the authors suggest a research agenda that includes descriptive studies to provide an up-to-date picture of services; investigations of how contemporary EAPs address substance use problems, including management consultation for early identification; further study of EAPs' effects on outcomes, such as productivity and work group outcomes; examination of the relationship between EAPs and other workplace resources; further examination of influences on EAP utilization; and development and testing of EAP performance measures.
IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach
NASA Astrophysics Data System (ADS)
Balitanas, Maricel; Kim, Tai-Hoon
This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.
Heitt, Michael C; Tamburo, Melissa Back
2005-01-01
The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.
Descriptive study of external employee assistance program providers (EAP) in Japan.
Muto, Takashi; Haruyama, Yasuo; Higashi, Toshiaki
2012-01-01
The mental health problems of employees have become a major occupational health issue in Japan. External employee assistance program providers (EAP) have become important in mental health care for workers, but their activities are poorly documented. This descriptive study was undertaken to clarify the status and future tasks of EAP in Japan. The subjects were all EAP (n=27) registered in the Japanese Chapter of Employee Assistance Professionals Association. The questionnaire survey was conducted in January 2007. We received 13 replies, a response rate of 54.2%. Most EAP provided seminars, stress checks, stress management, counseling, and support for a return to work. The number of EAP contracted with small-scale enterprises was small. EAP communicated infrequently with companies. To promote the use of EAP, their advertising, education and training of staff, accumulation of scientific evidence, development of an official certification system for staff, and improvement of contents of EAP services were cited.
Richmond, Melissa K; Pampel, Fred C; Wood, Randi C; Nunes, Ana P
2016-07-01
To test the impact of Employee Assistance Programs (EAPs) on reducing employee depression, anxiety, and risky alcohol use, and whether improvements in clinical symptoms lead to improved work outcomes. The study used a prospective, quasi-experimental design with propensity score matching. Participants (n = 344) came from 20 areas of state government. EAP (n = 156) and non-EAP (n = 188) employees were matched on baseline demographic, psychosocial, and work-related characteristics that differentiate EAP from non-EAP users. Follow-up surveys were collected 2 to 12 months later (M = 6.0). EAP significantly reduced symptoms of depression and anxiety, but not at-risk alcohol use. EAP reductions in depression and anxiety mediated EAP-based reductions in absenteeism and presenteeism. EAPs provide easy-to-access work-based services that are effective at improving employee mental health.
Cai, Luyun; Feng, Jianhui; Peng, Xichun; Regenstein, Joe M; Li, Xiuxia; Li, Jianrong; Zhao, Wei
2016-12-01
The physicochemical properties and nanostructure of mixtures of egg albumen protein (EAP) and gelatin from under-utilised grass carp ( Ctenopharyngodon idella ) skins were studied. The gelatin with 1% EAP had an acceptable gel strength. The addition of 5% EAP significantly increased the melting and gelling temperatures of gelatin gels. Additionally, the colour turned white and the crystallinity was higher in gelatin gels with gradient concentrations of EAP (1, 3, and 5%). Gelatin with 5% EAP had the highest G' values while gelatin with 1% EAP had the lowest G' values. Atomic force microscopy showed the heterogeneous nanostructure of fish gelatin, and a simple coacervate with a homogeneous distribution was only observed with the addition of 1% EAP, indicating interaction between gelatin and EAP. These results showed that EAP effect fish gelatin's physicochemical and nanostructure properties and has potential applications in foods and pharmaceuticals.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
New secure communication-layer standard for medical image management (ISCL)
NASA Astrophysics Data System (ADS)
Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki
1999-07-01
This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.
Li, Mengxing; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili
2014-01-01
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks. PMID:24711729
Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili
2014-01-01
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.
21 CFR 1311.140 - Requirements for signing a controlled substance prescription.
Code of Federal Regulations, 2010 CFR
2010-04-01
... following statement or its substantial equivalent is displayed: “By completing the two-factor authentication... above information to the pharmacy for dispensing. The two-factor authentication protocol may only be... section remain displayed, the practitioner must be prompted to complete the two-factor authentication...
42 CFR 405.718 - Expedited appeals process.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Part A § 405.718 Expedited appeals process. (a) Conditions for use of expedited appeals process (EAP). A party may use the EAP to request court review in place of an administrative law judge (ALJ..., with the request for the EAP. (b) Content of the request for EAP. The request for the EAP: (1) Alleges...
EAP Service Use in a Managed Behavioral Health Care Organization: From the Employee Perspective.
Merrick, Elizabeth L; Hodgkin, Dominic; Hiatt, Deirdre; Horgan, Constance M; McCann, Bernard
2011-01-01
Contemporary employee assistance program (EAP) services are typically provided in broad-brush programs delivered by large external vendors in a network model. Yet research has not kept pace with EAP evolution, including in terms of how EAP clients themselves view services. We surveyed a random sample of EAP service users from a national provider (361 respondents). About one-third of respondents reported getting help for workplace issues. Most learned about the EAP through employer communications such as the company website. The large majority reported that the EAP helped them "a lot" or "some," suggesting they valued this benefit.
EAP Service Use in a Managed Behavioral Health Care Organization: From the Employee Perspective
Hodgkin, Dominic; Hiatt, Deirdre; Horgan, Constance M.; McCann, Bernard
2011-01-01
SUMMARY Contemporary employee assistance program (EAP) services are typically provided in broad-brush programs delivered by large external vendors in a network model. Yet research has not kept pace with EAP evolution, including in terms of how EAP clients themselves view services. We surveyed a random sample of EAP service users from a national provider (361 respondents). About one-third of respondents reported getting help for workplace issues. Most learned about the EAP through employer communications such as the company website. The large majority reported that the EAP helped them “a lot” or “some,” suggesting they valued this benefit. PMID:21966281
42 CFR 405.853 - Expedited appeals process.
Code of Federal Regulations, 2010 CFR
2010-10-01
....853 Expedited appeals process. (a) Conditions for use of expedited appeals process (EAP). A party may use the EAP set forth in § 405.718 of this chapter to request court review in place of the ALJ hearing... the request for an EAP. (b) Content of the request for EAP. The request for an EAP: (1) Alleges that...
eap Gene as novel target for specific identification of Staphylococcus aureus.
Hussain, Muzaffar; von Eiff, Christof; Sinha, Bhanu; Joost, Insa; Herrmann, Mathias; Peters, Georg; Becker, Karsten
2008-02-01
The cell surface-associated extracellular adherence protein (Eap) mediates adherence of Staphylococcus aureus to host extracellular matrix components and inhibits inflammation, wound healing, and angiogenesis. A well-characterized collection of S. aureus and non-S. aureus staphylococcal isolates (n = 813) was tested for the presence of the Eap-encoding gene (eap) by PCR to investigate the use of the eap gene as a specific diagnostic tool for identification of S. aureus. Whereas all 597 S. aureus isolates were eap positive, this gene was not detectable in 216 non-S. aureus staphylococcal isolates comprising 47 different species and subspecies of coagulase-negative staphylococci and non-S. aureus coagulase-positive or coagulase-variable staphylococci. Furthermore, non-S. aureus isolates did not express Eap homologs, as verified on the transcriptional and protein levels. Based on these data, the sensitivity and specificity of the newly developed PCR targeting the eap gene were both 100%. Thus, the unique occurrence of Eap in S. aureus offers a promising tool particularly suitable for molecular diagnostics of this pathogen.
Toczyski, D P; Steitz, J A
1993-01-01
EAP (EBER-associated protein) is an abundant, 15-kDa cellular RNA-binding protein which associates with certain herpesvirus small RNAs. We have raised polyclonal anti-EAP antibodies against a glutathione S-transferase-EAP fusion protein. Analysis of the RNA precipitated by these antibodies from Epstein-Barr virus (EBV)- or herpesvirus papio (HVP)-infected cells shows that > 95% of EBER 1 (EBV-encoded RNA 1) and the majority of HVP 1 (an HVP small RNA homologous to EBER 1) are associated with EAP. RNase protection experiments performed on native EBER 1 particles with affinity-purified anti-EAP antibodies demonstrate that EAP binds a stem-loop structure (stem-loop 3) of EBER 1. Since bacterially expressed glutathione S-transferase-EAP fusion protein binds EBER 1, we conclude that EAP binding is independent of any other cellular or viral protein. Detailed mutational analyses of stem-loop 3 suggest that EAP recognizes the majority of the nucleotides in this hairpin, interacting with both single-stranded and double-stranded regions in a sequence-specific manner. Binding studies utilizing EBER 1 deletion mutants suggest that there may also be a second, weaker EAP-binding site on stem-loop 4 of EBER 1. These data and the fact that stem-loop 3 represents the most highly conserved region between EBER 1 and HVP 1 suggest that EAP binding is a critical aspect of EBER 1 and HVP 1 function. Images PMID:8380232
Haggar, A; Flock, J-I; Norrby-Teglund, A
2010-08-01
Extracellular adherence protein (Eap) from Staphylococcus aureus has been reported to have strong anti-inflammatory properties, which make Eap a potential anti-inflammatory agent. However, Eap has also been demonstrated to trigger T-cell activation and to share structural homology with superantigens. In this study, we focused on whether Eap fulfilled the definition criteria for a superantigen. We demonstrate that T-cell activation by Eap is dependent on both major histocompatibility complex class II and intercellular adhesion molecule type 1, that cellular processing is required for Eap to elicit T-cell proliferation, and that the kinetics of proliferation resemble the profile of a conventional antigen and not that of a superantigen.
Workplace Stress, Organizational Factors and EAP Utilization.
Azzone, Vanessa; McCann, Bernard; Merrick, Elizabeth Levy; Hiatt, Deirdre; Hodgkin, Dominic; Horgan, Constance
2009-01-01
This study examined relationships between workplace stress, organizational factors and use of EAP counseling services delivered by network providers in a large, privately-insured population. Claims data were linked to measures of workplace stress, focus on wellness/prevention, EAP promotion, and EAP activities for health care plan enrollees from 26 employers. The association of external environment and work organization variables with use of EAP counseling services was examined. Higher levels of EAP promotion and worksite activities were associated with greater likelihood of service use. Greater focus on wellness/prevention and unusual and significant stress were associated with lower likelihood of service use. Results provide stakeholders with insights on approaches to increasing utilization of EAP services.
Workplace Stress, Organizational Factors and EAP Utilization
Azzone, Vanessa; McCann, Bernard; Merrick, Elizabeth Levy; Hiatt, Deirdre; Hodgkin, Dominic; Horgan, Constance
2013-01-01
This study examined relationships between workplace stress, organizational factors and use of EAP counseling services delivered by network providers in a large, privately-insured population. Claims data were linked to measures of workplace stress, focus on wellness/prevention, EAP promotion, and EAP activities for health care plan enrollees from 26 employers. The association of external environment and work organization variables with use of EAP counseling services was examined. Higher levels of EAP promotion and worksite activities were associated with greater likelihood of service use. Greater focus on wellness/prevention and unusual and significant stress were associated with lower likelihood of service use. Results provide stakeholders with insights on approaches to increasing utilization of EAP services. PMID:24058322
Levy Merrick, Elizabeth S.; Volpe-Vartanian, Joanna; Horgan, Constance M.; McCann, Bernard
2012-01-01
This column describes employee assistance program (EAPs) and identifies key issues for contemporary EAPs. These programs began as occupational alcohol programs and have evolved into more comprehensive resources. To better understand contemporary EAPs, the authors suggest a research agenda at includes descriptive studies to provide an up-to-date picture of services; investigations of how contemporary EAPs address substance use problems, including management consultation for early identification; further study of EAPs’ effects on outcomes, such as productivity and work group outcomes; examination of the relationship between EAPs and other workplace resources; further examination of influences on EAP utilization; and development and testing of EAP performance measures. PMID:17914000
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Hansen, Uwe; Hussain, Muzaffar; Villone, Daniela; Herrmann, Mathias; Robenek, Horst; Peters, Georg; Sinha, Bhanu; Bruckner, Peter
2006-05-01
Besides a number of cell wall-anchored adhesins, the majority of Staphylococcus aureus strains produce anchorless, cell wall-associated proteins, such as Eap (extracellular adherence protein). Eap contains four to six tandem repeat (EAP)-domains. Eap mediates diverse biological functions, including adherence and immunomodulation, thus contributing to S. aureus pathogenesis. Eap binding to host macromolecules is unusually promiscuous and includes matrix or matricellular proteins as well as plasma proteins. The structural basis of this promiscuity is poorly understood. Here, we show that in spite of the preferential location of the binding epitopes within triple helical regions in some collagens there is a striking specificity of Eap binding to different collagen types. Collagen I, but not collagen II, is a binding substrate in monomolecular form. However, collagen I is virtually unrecognized by Eap when incorporated into banded fibrils. By contrast, microfibrils containing collagen VI as well as basement membrane-associated networks containing collagen IV, or aggregates containing fibronectin bound Eap as effectively as the monomeric proteins. Therefore, Eap-binding to extracellular matrix ligands is promiscuous at the molecular level but not indiscriminate with respect to supramolecular structures containing the same macromolecules. In addition, Eap bound to banded fibrils after their partial disintegration by matrix-degrading proteinases, including matrix metalloproteinase 1. Therefore, adherence to matrix suprastructures by S. aureus can be supported by inflammatory reactions.
Pollack, Keshia M; McKay, Tasseli; Cumminskey, Chris; Clinton-Sherrod, A Monique; Lindquist, Christine H; Lasater, Beth M; Walters, Jennifer L Hardison; Krotki, Karol; Grisso, Jeane Ann
2010-08-01
To describe intimate partner violence (IPV) services available through employee assistance programs (EAPs) and determine women's satisfaction with these services. A mixed-methods study consisting of semistructured telephone interviews with 28 EAPs about IPV-related services and a national web-based survey of 1765 women regarding their interactions with EAPs when seeking IPV-related assistance. Data were collected in the fall of 2008. EAPs provide fairly extensive services to individuals experiencing IPV. Satisfaction with EAP services for IPV was significantly associated with annual income and the type of help received from the EAP, but not with type of IPV experienced. EAP representatives described challenges with accurately identifying IPV victims and women expressed concerns with confidentiality. Future efforts to enhance the ability of EAPs to respond effectively to IPV should address confidentially and strengthen how IPV-related assistance is delivered.
Levels of substance use and willingness to use the Employee Assistance Program.
Reynolds, G Shawn; Lehman, Wayne E K
2003-01-01
Individuals with drinking and drug problems may become particularly reluctant to seek help. To remove barriers to services, more needs to be understood about factors that influence help-seeking decisions. It was hypothesized that certain social psychological influences (attitudes, group cohesion, trust in management) might buffer a reluctance to use services provided by an external Employee Assistance Program (EAP). A random sampling of municipal employees (n = 793) completed anonymous questionnaires that assessed willingness to use the EAP, individual drinking and drug use, attitudes toward policy, work group cohesion, and trust in management. Data from the questionnaires were analyzed with multivariate regression analyses to examine the interacting effects of substance abuse and proposed moderators (gender, race, awareness of the EAP, perceptions of policy, cohesion) on willingness to use the EAP. The results demonstrated that although substance abusers were less willing to use the EAP than were nonusers, substance abusers who were aware of the EAP, who had favorable attitudes toward policy, and who did not tolerate coworker substance abuse were as willing to use the EAP as were nonusers. The results also showed that employees with greater awareness of the EAP, support for policy, and perceptions of work group cohesion reported significantly greater willingness to use the EAP than did employees with relatively less awareness of the EAP, policy support, and cohesion. Workplace prevention efforts that are designed to increase the use of EAP services should intentionally target the workplace environment and social context. Creating the awareness and favorability of the EAP, policy, and work group cohesion might buffer substance abusers' reluctance to seek help.
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier
2010-01-01
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
NASA Astrophysics Data System (ADS)
Moriyama, Daisuke; Okamoto, Tatsuaki
This paper presents a (PKI-based) two-pass authenticated key exchange (AKE) protocol that is secure in the extended Canetti-Krawczyk (eCK) security model. The security of the proposed protocol is proven without random oracles (under three assumptions), and relies on no implementation techniques such as a trick by LaMacchia, Lauter and Mityagin (so-called the NAXOS trick). Since an AKE protocol that is eCK-secure under a NAXOS-like implementation trick will be no more eCK-secure if some realistic information leakage occurs through side-channel attacks, it has been an important open problem how to realize an eCK-secure AKE protocol without using the NAXOS tricks (and without random oracles).
Sensor Authentication in Collaborating Sensor Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bielefeldt, Jake Uriah
2014-11-01
In this thesis, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O i of Sensor Network S imore » to correctly determine the number of active sensors in Network Si. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first to addresses a practical security problem in collaborating sensor networks.« less
Geisbrecht, Brian V; Hamaoka, Brent Y; Perman, Benjamin; Zemla, Adam; Leahy, Daniel J
2005-04-29
The Eap (extracellular adherence protein) of Staphylococcus aureus functions as a secreted virulence factor by mediating interactions between the bacterial cell surface and several extracellular host proteins. Eap proteins from different Staphylococcal strains consist of four to six tandem repeats of a structurally uncharacterized domain (EAP domain). We have determined the three-dimensional structures of three different EAP domains to 1.8, 2.2, and 1.35 A resolution, respectively. These structures reveal a core fold that is comprised of an alpha-helix lying diagonally across a five-stranded, mixed beta-sheet. Comparison of EAP domains with known structures reveals an unexpected homology with the C-terminal domain of bacterial superantigens. Examination of the structure of the superantigen SEC2 bound to the beta-chain of a T-cell receptor suggests a possible ligand-binding site within the EAP domain (Fields, B. A., Malchiodi, E. L., Li, H., Ysern, X., Stauffacher, C. V., Schlievert, P. M., Karjalainen, K., and Mariuzza, R. (1996) Nature 384, 188-192). These results provide the first structural characterization of EAP domains, relate EAP domains to a large class of bacterial toxins, and will guide the design of future experiments to analyze EAP domain structure/function relationships.
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...
Employee assistance programs: a workplace resource to address intimate partner violence.
Pollack, Keshia M; Austin, Whitney; Grisso, Jeane Ann
2010-04-01
Intimate partner violence (IPV) is a major public health problem with significant impact on the workplace. Employee assistance programs (EAPs) are a confidential benefit to assist employees and their families with a variety of problems that may negatively affect their job performance. The purpose of this systematic review is to study the extant literature to identify articles that have explored the role of EAPs in addressing IPV. We searched Medline, PsychINFO, and Cumulative Index of Nursing and Allied Health Literature (CINAHL) for English-language papers that have explored how EAPs can address IPV. Articles published through 2008 were included. Our review yielded nine articles, mostly from EAP-centered journals. Nearly all of the studies were published before the year 2000 and primarily describe the need for EAPs to be more engaged in preventing violence against women. Most of the studies were commentaries, often using case reports to support recommendations on how EAPs could address IPV. Results from the two intervention studies revealed close connections between EAP clients being treated for alcoholism and IPV perpetration and the effectiveness of a standardized tool to identify EAP clients experiencing IPV. Research in this area is in its infancy, and more studies are needed to inform the formulation of evidence-based policies and programs that guide the role of EAPs in addressing IPV. The lack of research on how EAPs address IPV is alarming, as many employers state that they often refer employees affected by IPV to the EAP for assistance.
Walters, Jennifer L Hardison; Pollack, Keshia M; Clinton-Sherrod, Monique; Lindquist, Christine H; McKay, Tasseli; Lasater, Beth M
2012-01-01
Employee Assistance Programs (EAPs) are workplace resources available to employees with problems impacting work performance. EAPs are well-positioned to address intimate partner violence (IPV), a major public health problem with workplace impacts. A purposeful sample of 28 EAPs across the United States was surveyed to identify policies and programs to address IPV, including perpetration. Most EAPs did not report having standardized approaches for addressing IPV perpetration. EAPs also described significant barriers to identifying IPV perpetrators, with the majority relying on self-disclosure on the part of the perpetrator when contacting the EAP. These results suggest that many EAPs--even when interacting with employees who present with issues known to correlate with IPV--are missing a potential opportunity to assess and intervene with IPV perpetrators.
Watermarking protocols for authentication and ownership protection based on timestamps and holograms
NASA Astrophysics Data System (ADS)
Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla
2002-04-01
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.
Sever-Chroneos, Zvjezdana; Krupa, Agnieszka; Davis, Jeremy; Hasan, Misbah; Yang, Ching-Hui; Szeliga, Jacek; Herrmann, Mathias; Hussain, Muzafar; Geisbrecht, Brian V; Kobzik, Lester; Chroneos, Zissis C
2011-02-11
Staphylococcus aureus causes life-threatening pneumonia in hospitals and deadly superinfection during viral influenza. The current study investigated the role of surfactant protein A (SP-A) in opsonization and clearance of S. aureus. Previous studies showed that SP-A mediates phagocytosis via the SP-A receptor 210 (SP-R210). Here, we show that SP-R210 mediates binding and control of SP-A-opsonized S. aureus by macrophages. We determined that SP-A binds S. aureus through the extracellular adhesin Eap. Consequently, SP-A enhanced macrophage uptake of Eap-expressing (Eap(+)) but not Eap-deficient (Eap(-)) S. aureus. In a reciprocal fashion, SP-A failed to enhance uptake of Eap(+) S. aureus in peritoneal Raw264.7 macrophages with a dominant negative mutation (SP-R210(DN)) blocking surface expression of SP-R210. Accordingly, WT mice cleared infection with Eap(+) but succumbed to sublethal infection with Eap- S. aureus. However, SP-R210(DN) cells compensated by increasing non-opsonic phagocytosis of Eap(+) S. aureus via the scavenger receptor scavenger receptor class A (SR-A), while non-opsonic uptake of Eap(-) S. aureus was impaired. Macrophages express two isoforms: SP-R210(L) and SP-R210(S). The results show that WT alveolar macrophages are distinguished by expression of SP-R210(L), whereas SR-A(-/-) alveolar macrophages are deficient in SP-R210(L) expressing only SP-R210(S). Accordingly, SR-A(-/-) mice were highly susceptible to both Eap(+) and Eap(-) S. aureus. The lungs of susceptible mice generated abnormal inflammatory responses that were associated with impaired killing and persistence of S. aureus infection in the lung. In conclusion, alveolar macrophage SP-R210(L) mediates recognition and killing of SP-A-opsonized S. aureus in vivo, coordinating inflammatory responses and resolution of S. aureus pneumonia through interaction with SR-A.
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
BFT replication resistant to MAC attacks
NASA Astrophysics Data System (ADS)
Zbierski, Maciej
2016-09-01
Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.
The Costs of an Enhanced Employee Assistance Program (EAP) Intervention.
ERIC Educational Resources Information Center
French, Michael T.; Dunlap, Laura J.; Zarkin, Gary A.; Karuntzos, Georgia T.
1998-01-01
This study estimates the economic costs of an enhanced Employee Assistance Program (EAP) intervention at a large midwestern EAP that serves 90 worksites. Results specify developmental and implementation costs and provide benchmark cost estimated for other EAPs that may be considering enhanced services. (SLD)
Beyond Needs Analysis: Soft Systems Methodology for Meaningful Collaboration in EAP Course Design
ERIC Educational Resources Information Center
Tajino, Akira; James, Robert; Kijima, Kyoichi
2005-01-01
Designing an EAP course requires collaboration among various concerned stakeholders, including students, subject teachers, institutional administrators and EAP teachers themselves. While needs analysis is often considered fundamental to EAP, alternative research methodologies may be required to facilitate meaningful collaboration between these…
Job Satisfaction among Employee Assistance Professionals: A National Study.
ERIC Educational Resources Information Center
Sweeney, Anthony P.; Hohenshil, Thomas H.; Fortune, Jimmie C.
2002-01-01
Study examines job satisfaction in a national sample of employee assistance program (EAP) professionals. Data were collected from 210 EAP professionals through mailed surveys. Results indicate that respondents employed by external EAP organizations were more satisfied with their jobs than those who were employed by internal EAPs. (Contains 20…
EAP Referrals: From Supervisor Training to Client Assessment.
ERIC Educational Resources Information Center
Schneider, Rob; Colan, Neil
For several decades Employee Assistance Programs (EAPs) have been a resource in the workplace to handle troubled employees. The areas of supervisor training and employee motivation provide opportunities for involvement of psychologists in the EAP field. Surveys conducted with EAP directors revealed that many programs are planning to do supervisor…
On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)
2013-07-01
Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of
EAP's Response to Personal Stress and Productivity: Implications for Occupational Social Work.
ERIC Educational Resources Information Center
Ramanathan, Chathapuram S.
1992-01-01
Used pretest-posttest design to investigate influence of employee assistance program (EAP) on employee stress and productivity at time of initial contact with EAP and two and four months later. Findings from 47 employees who used EAP services revealed that, although personal stress and employee productivity were related, employee assistance…
ERIC Educational Resources Information Center
Leopold, Lisa
2011-01-01
This case study of an adjunct-model English for Academic Purposes (EAP) writing course linked to a policy-analysis course describes an effective approach for putting "specificity" into practice in EAP curriculum design. The rationale for interdisciplinary collaboration, the positive learning outcomes from the EAP writing course, the…
Organizational Hierarchy, Employee Status, and Use of Employee Assistance Programs.
ERIC Educational Resources Information Center
Gerstein, Lawrence; And Others
1993-01-01
Examined role of organizational hierarchy and staff status in number of Employee Assistance Program (EAP) referrals made by potential helpers and relationship of these variables to personal EAP use among 157 supervisors and 232 employees. Supervisors suggested more EAP referrals than did employees. Middle level staff received EAP services more…
How Perceptions of Mental Illness Impact EAP Utilization.
McRee, Jayme
2017-01-01
Studies of employee assistance program (EAP) clinical use across multiple industries and multiple EAP delivery models range from highs greater than 5% to lows of less than 1 %. Despite the range in utilization, the rates of employee behaviors that indicate a behavioral health issue are significantly higher, suggesting far too little use of EAPs overall. Studies of the costs to an employer for an employee with a mental health issue are as high as 37% lost annual productivity. EAPs have attempted to raise utilization through a variety of efforts, with mixed results. Most EAP utilization initiatives fail to address the impact of stigma, misunderstandings about mental illness and the reluctance of many employees to seek counseling as an option for better management of stress, work-life balance and overall mental wellness. For both employers and EAPs, addressing the impact of stigma and perceptions of mental illness is costly, requiring greater direct employee engagement and education. However, it is a more effective means of increasing EAP use than current practices and, ultimately, can result in significantly higher net gains in productivity while reducing employers' direct costs.
The influence of passband limitation on the waveform of extracellular action potential.
Mizuhiki, Takashi; Inaba, Kiyonori; Setogawa, Tsuyoshi; Toda, Koji; Ozaki, Shigeru; Shidara, Muneteka
2012-03-01
The duration of the extracellular action potential (EAP) in single neuronal recording has often been used as a clue to infer biochemical, physiological or functional substrate of the recorded neurons, e.g. neurochemical type. However, when recording a neuronal activity, the high-pass filter is routinely used to achieve higher signal-to-noise ratio. Signal processing theory predicts that passband limitation stretches the waveform of discrete brief impulse. To examine whether the duration of filtered EAP could be the reliable measure, we investigated the influence of high-pass filter both by simulation and unfiltered unit recording data from monkey dorsal raphe. Consistent with the findings in recent theoretical study, the unfiltered EAPs displayed the sharp wave without following bumps. The duration of unfiltered EAP was not correlated with that of filtered EAP. Thus the duration of original EAP cannot be estimated from filtered EAP. It is needed to reexamine the EAP duration measured for classifying the neurons whose activities were recorded under the passband limitation in the related studies. Copyright © 2011 Elsevier Ireland Ltd and the Japan Neuroscience Society. All rights reserved.
The Staphyloccous aureus Eap protein activates expression of proinflammatory cytokines.
Scriba, Thomas J; Sierro, Sophie; Brown, Eric L; Phillips, Rodney E; Sewell, Andrew K; Massey, Ruth C
2008-05-01
The extracellular adhesion protein (Eap) secreted by the major human pathogen Staphylococcus aureus is known to have several effects on human immunity. We have recently added to knowledge of these roles by demonstrating that Eap enhances interactions between major histocompatibility complex molecules and human leukocytes. Several studies have indicated that Eap can induce cytokine production by human peripheral blood mononuclear cells (PBMCs). To date, there has been no rigorous attempt to identify the breadth of cytokines produced by Eap stimulation or to identify the cell subsets that respond. Here, we demonstrate that Eap induces the secretion of the proinflammatory cytokines interleukin 6 (IL-6) and tumor necrosis factor alpha (TNF-alpha) by CD14(+) leukocytes (monocytes and macrophages) within direct ex vivo PBMC populations (note that granulocytes are also CD14(+) but are largely depleted from PBMC preparations). Anti-intercellular adhesion molecule 1 (CD54) antibodies inhibited this induction and implicated a role for this known Eap binding protein in cellular activation. IL-6 and TNF-alpha secretion by murine cells exposed to Eap was also observed. The activation of CD14(+) cells by Eap suggests that it could play a significant role in both septic shock and fever, two of the major pathological features of S. aureus infections.
Platform based design of EAP transducers in Danfoss PolyPower A/S
NASA Astrophysics Data System (ADS)
Sarban, Rahimullah; Gudlaugsson, Tómas V.
2013-04-01
Electroactive Polymer (EAP) has gained increasing focus, in research communities, in last two decades. Research within the field of EAP has, so far, been mainly focused on material improvements, characterization, modeling and developing demonstrators. As the EAP technology matures, the need for a new area of research namely product development emerges. Product development can be based on an isolated design and production for a single product or platform design where a product family is developed. In platform design the families of products exploits commonality of platform modules while satisfying a variety of different market segments. Platform based approach has the primary benefit of being cost efficient and short lead time to market when new products emerges. Products development based on EAP technology is challenging both technologically as well as from production and processing point of view. Both the technological and processing challenges need to be addressed before a successful implementation of EAP technology into products. Based on this need Danfoss PolyPower A/S has, in 2011, launched a EAP platform project in collaboration with three Danish universities and three commercial organizations. The aim of the project is to develop platform based designs and product family for the EAP components to be used in variety of applications. This paper presents the structure of the platform project as a whole and specifically the platform based designs of EAP transducers. The underlying technologies, essential for EAP transducers, are also presented. Conceptual design and solution for the concepts are presented as well.
Joost, Insa; Jacob, Susanne; Utermöhlen, Olaf; Schubert, Uwe; Patti, Joseph M; Ong, Mei-Fang; Gross, Jürgen; Justinger, Christoph; Renno, Jörg H; Preissner, Klaus T; Bischoff, Markus; Herrmann, Mathias
2011-06-01
The extracellular adherence protein (Eap) from Staphylococcus aureus has been suggested as a vaccine candidate and for therapeutic use due to its immunomodulating and antiangiogenic properties; however, little is known about anti-Eap antibodies in humans. We determined anti-Eap antibody titers by enzyme-linked immunosorbent assay and Western blot and measured serum samples from 92 patients with proven S. aureus infections and 93 healthy controls. The functionality of antibodies was assessed by a phagocytosis assay using Eap-coated fluorescent microspheres. Antibodies were detected in all human samples, but not in mice. Patients showed significantly higher titers than controls [immunoglobulin M (IgM), P=0.007; IgG, P<0.0001]. Patients with deep or severe infections showed higher titers than those with superficial or mild disease. Eap alone was sufficient to promote phagocytosis by peripheral blood mononuclear cell and granulocytes that was moderately enhanced in the presence of human serum, but no correlation was found with the levels of anti-Eap antibodies. Anti-Eap antibodies are prevalent in all tested humans and correlate with the severity of S. aureus infection; however, they do not seem to provide protection against invasive infections. Before considering Eap for therapy or as a vaccine candidate, further studies are warranted to assess the impact of the interference between Eap and its specific antibodies. © 2011 Federation of European Microbiological Societies. Published by Blackwell Publishing Ltd. All rights reserved.
LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP
NASA Astrophysics Data System (ADS)
Chenait, Manel
Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.
The effect of employee assistance plan benefits on the use of outpatient behavioral health care.
Hodgkin, Dominic; Merrick, Elizabeth L; Hiatt, Deirdre; Horgan, Constance M; McGuire, Thomas G
2010-12-01
Nearly half of all US workers have access to an employee assistance plan (EAP). At the same time, most large US employers also purchase health benefits for their employees, and these benefits packages typically include behavioral health services. There is some potential overlap in services covered by the EAP and the health plan, and some employers choose to purchase the two jointly as an 'integrated product'. It is not clear whether EAP services substitute for outpatient behavioral health care services covered by the health plan. To evaluate how the number of EAP visits covered affects the use of regular outpatient behavioral health care (number of visits, and total spending), in an integrated product setting. Analysis of claims, eligibility and benefits data for 26,464 users of behavioral health care for the year 2005. For both EAP and regular behavioral health care, the individuals were enrolled with Managed Health Network (MHN), a large national specialty insurance plan. Multivariate regression analyses were performed to investigate the determinants of the number of regular outpatient visits, and spending for regular outpatient care. To address skewness in the dependent variables, the estimation used generalized linear models with a log link. A limited instrumental variable analysis was used to test for endogeneity of the number of EAP visits covered. Nearly half the enrollees in this sample were in employer plans that allowed 4-5 EAP visits per treatment episode, and 31% were allowed 3 EAP visits per year. Having an EAP visit allowance of 4-5 sessions per episode predicts fewer regular outpatient visits, compared with having an allowance of 3 sessions per year. More generous EAP allowances also reduce payments for outpatient care, with one exception. Greater availability of EAP benefits appears to reduce utilization of regular outpatient care, supporting the idea that the two types of care are to some extent perceived as substitutes. One limitation of this study is its cross-sectional nature, since the relationships observed could reflect the effect of other unmeasured variables. Also, the data are from a single managed behavioral health organization, limiting generalizability somewhat, although many employers are represented in the data. The results should discourage employers from either eliminating EAP benefits as duplicative, or replacing behavioral health benefits with an expanded EAP. Patients appear to perceive that EAP services offer something distinct from regular outpatient care. Future studies should see whether these results are reproduced, ideally by looking at employer plans with a wider range of EAP visit allowances.
ERIC Educational Resources Information Center
Dashtestani, Reza
2018-01-01
Learning English for academic purposes (EAP) can help university students promote their academic literacy through socializing them into academic communities of practice. This study examined the impact of the use of collaborative projects on three social network sites on EAP students' attitudes towards EAP and academic content learning. Three…
Transfer Climate and EAP Education: Students Perceptions of Challenges to Learning Transfer
ERIC Educational Resources Information Center
James, Mark Andrew
2010-01-01
This study examined the applicability of the construct transfer climate in EAP education. In an EAP setting, transfer climate can be viewed as the support for learning transfer from an EAP course that students perceive in mainstream academic courses. The research question was as follows: What can a transfer climate perspective reveal about…
A Review of Research Methods Used to Examine Employee Assistance Program Delivery Options.
ERIC Educational Resources Information Center
Csiernik, Rick
1995-01-01
This review of literature on Employee Assistance Programs (EAPs) focuses on EAP delivery options. More than half of the 48 studies reviewed used a case study approach. EAPs provided by on-staff professionals were the most frequently discussed delivery option, although this is not the most dominant form of EAP provision. (SLD)
Evaluation of an employee assistance program.
Nadolski, J N; Sandonato, C E
1987-01-01
The objective of the EAP effectiveness study was to determine the effectiveness of the EAP counseling services. The results demonstrate that employees who received help from the company's EAP subsequently improved their work performance. Although these results cannot be generalized to other EAPs, the results are encouraging and point toward a need for more research in this area.
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
A new method of enhancing telecommand security: the application of GCM in TC protocol
NASA Astrophysics Data System (ADS)
Zhang, Lei; Tang, Chaojing; Zhang, Quan
2007-11-01
In recent times, security has grown to a topic of major importance for the space missions. Many space agencies have been engaged in research on the selection of proper algorithms for ensuring Telecommand security according to the space communication environment, especially in regard to the privacy and authentication. Since space missions with high security levels need to ensure both privacy and authentication, Authenticated Encryption with Associated Data schemes (AEAD) be integrated into normal Telecommand protocols. This paper provides an overview of the Galois Counter Mode (GCM) of operation, which is one of the available two-pass AEAD schemes, and some preliminary considerations and analyses about its possible application to Telecommand frames specified by CCSDS.
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram
2016-07-01
To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.
Jacobson, Jodi M; Sacco, Paul
2012-01-01
Fourteen million U.S. workers meet the diagnostic criteria for substance dependence, costing millions in lost productivity. Prior research suggests that employees who follow through with their Employee Assistance Program's (EAP) recommendations are more likely to participate and remain engaged in alcohol and other drug (AOD) treatment programs. This study identified rates of lifetime EAP service use for AOD problems and compared adults who reported using EAP services for AOD problems with those who used services other than EAP. Researchers analyzed a subset of participants from the National Epidemiologic Survey of Alcohol and Related Conditions who reported having received help for an AOD problem (NESARC, 2001-2002). Statistical analyses tested for differences in sociodemographic variables, lifetime mental health and substance abuse disorders, and health disability between EAP services users and users of other types of services. Among adults who sought services for AOD problems (n= 2,272), 7.58% (n= 166) reported using EAP services for these problems at some point during their lives. Major depressive disorder (lifetime), a drug use disorder (lifetime), and Black race/ethnicity were associated with a greater likelihood that someone would seek EAP services for help with their AOD problem. Results provide a foundation for researchers to understand who uses EAP services for AOD problems. Health and mental health professionals should increase their knowledge of EAP services to improve continuity of care for employees with AOD problems. EAPs are in a unique position to reach out to vulnerable employees in the workplace and engage them in treatment. Copyright © American Academy of Addiction Psychiatry.
Blum, T C; Roman, P M; Harwood, E M
1995-01-01
After a brief description of employee assistance programs (EAP), we present data collected from 6,400 employees from 84 worksites who used the services of EAPs, a portion of whom were assessed by the EAP as having alcohol-related problems and/or received scores on the Alcohol Dependence Scale (ADS) indicative of a potential alcohol-related problem. In addition, data were collected at intake from the EAP administrators, and employment status of the employee clients was assessed 18 to 24 months later. These data indicate that EAPs are effective in sustaining the employment of most women with alcohol-related problems who seek services from EAPs and that EAPs' goal of early intervention is especially realized among women with alcohol problems. Other conclusions include: women with alcohol problems do not enter EAPs through routes that are strikingly different from those of men; many of the gender differences that are revealed are associated with job status differences; employed women with alcohol problems are detached from nuclear families, with markedly low rates of current marriage; even when married, spouses are less likely to play a role in the referral of women with alcohol problems than the spouses of the men; and, there is no clear indication that women are the target of any form of discrimination in the process of EAP utilization. However, women are considerably more likely to have less adequate insurance coverage, according to the EAP administrators' assessment reported at client intake, than their male counterparts, leading to treatment choices that may be less than appropriate.
Athanasopoulos, Athanasios N; Economopoulou, Matina; Orlova, Valeria V; Sobke, Astrid; Schneider, Darius; Weber, Holger; Augustin, Hellmut G; Eming, Sabine A; Schubert, Uwe; Linn, Thomas; Nawroth, Peter P; Hussain, Muzaffar; Hammes, Hans-Peter; Herrmann, Mathias; Preissner, Klaus T; Chavakis, Triantafyllos
2006-04-01
Staphylococcus aureus is a major human pathogen interfering with host-cell functions. Impaired wound healing is often observed in S aureus-infected wounds, yet, the underlying mechanisms are poorly defined. Here, we identify the extracellular adherence protein (Eap) of S aureus to be responsible for impaired wound healing. In a mouse wound-healing model wound closure was inhibited in the presence of wild-type S aureus and this effect was reversible when the wounds were incubated with an isogenic Eap-deficient strain. Isolated Eap also delayed wound closure. In the presence of Eap, recruitment of inflammatory cells to the wound site as well as neovascularization of the wound were prevented. In vitro, Eap significantly reduced intercellular adhesion molecule 1 (ICAM-1)-dependent leukocyte-endothelial interactions and diminished the consequent activation of the proinflammatory transcription factor nuclear factor kappaB (NFkappaB) in leukocytes associated with a decrease in expression of tissue factor. Moreover, Eap blocked alphav-integrin-mediated endothelial-cell migration and capillary tube formation, and neovascularization in matrigels in vivo. Collectively, the potent anti-inflammatory and antiangiogenic properties of Eap provide an underlying mechanism that may explain the impaired wound healing in S aureus-infected wounds. Eap may also serve as a lead compound for new anti-inflammatory and antiangiogenic therapies in several pathologies.
Richmond, Melissa K; Pampel, Fred C; Wood, Randi C; Nunes, Ana P
2017-04-01
Employee Assistance Programs (EAPs) are widely used to help employees experiencing personal or work-related difficulties that impact work productivity. However, rigorous research on the effectiveness of programs to improve work-related outcomes is lacking. The current study represents a major advance in EAP research by using a prospective, quasi-experimental design with a large and diverse employee base. Using propensity scores calculated from demographic, social, work-related, and psychological variables collected on baseline surveys, we matched 156 employees receiving EAP to 188 non-EAP employees. Follow-up surveys were collected from 2 to 12 months post-baseline (M = 6.0). At follow-up, EAP employees had significantly greater reductions in absenteeism (b = -.596, p = .001) and presenteeism (b = -.217, p = .038), but not workplace distress (b = -.079, p = .448), than did non-EAP employees. Tests of moderation of baseline alcohol use, depression, anxiety, and productivity indicate that for the most part, the program works equally well for all groups. However, EAP did more to reduce absenteeism for those who began with lower severity of depression and anxiety at baseline. Results provide the scientific rigor needed to demonstrate EAP impact on improved work outcomes. In the first study of its kind, findings confirm the value of EAPs to help employees address personal and work-related concerns that are affecting job performance. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
ERIC Educational Resources Information Center
Eslami, Zohreh R.
2010-01-01
EAP plays a highly important role in countries where English is used mainly for academic purposes. However, EAP programs have been developed without conducting a systematic needs analysis from both the students' and instructors' perspective. The purpose of this study is to describe the perception that EAP students and instructors have of the…
Employee assistance programs: a worldwide perspective.
Burgess, K M; O'Donnell, W J; Bennett, A A; von Vietinghoff-Scheel, K
1997-08-01
Once limited to U.S. corporations, employee assistance programs (EAPs) are now spreading around the world. The authors review global EAP trends and identify similarities and differences among EAPs in North America, Europe, Central and South America, the Asia-Pacific region, and the Caribbean. Through affiliations between international professional associations and services to multinational corporations, the EAP field is quietly creating globalized behavioral health services.
Characterization of the electromechanical properties of EAP materials
NASA Technical Reports Server (NTRS)
Bar-Cohen, Yoseph; Sherrita, Stewart; Bhattachary, Kaushik; Lih, Shyh-Shiuh
2001-01-01
Electroactive polymers (EAP) are an emerging class of actuation materials. Their large electrically induced strains (longitudinal or bending), low density, mechanical flexibility, and ease of processing offer advantages over traditional electroactive materials. However, before the capability of these materials can be exploited, their electrical and mechanical behavior must be properly quantified. Two general types of EAP can be identified. The first type is ionic EAP, which requires relatively low voltages (<10V) to achieve large bending deflections. This class usually needs to be hydrated and electrochemical reactions may occur. The second type is Electronic-EAP and it involves electrostrictive and/or Maxwell stresses. This type of materials requires large electric fields (>100MV/m) to achieve longitudinal deformations at the range from 4 - 360%. Some of the difficulties in characterizing EAP include: nonlinear properties, large compliance (large mismatch with metal electrodes), nonhomogeneity resulting from processing, etc. To support the need for reliable data, the authors are developing characterization techniques to quantify the electroactive responses and material properties of EAP materials. The emphasis of the current study is on addressing electromechanical issues related to the ion-exchange type EAP also known as IPMC. The analysis, experiments and test results are discussed in this paper.
Staphylococcus aureus secretes a unique class of neutrophil serine protease inhibitors
Stapels, Daphne A. C.; Ramyar, Kasra X.; Bischoff, Markus; von Köckritz-Blickwede, Maren; Milder, Fin J.; Ruyken, Maartje; Eisenbeis, Janina; McWhorter, William J.; Herrmann, Mathias; van Kessel, Kok P. M.; Geisbrecht, Brian V.; Rooijakkers, Suzan H. M.
2014-01-01
Neutrophils are indispensable for clearing infections with the prominent human pathogen Staphylococcus aureus. Here, we report that S. aureus secretes a family of proteins that potently inhibits the activity of neutrophil serine proteases (NSPs): neutrophil elastase (NE), proteinase 3, and cathepsin G. The NSPs, but not related serine proteases, are specifically blocked by the extracellular adherence protein (Eap) and the functionally orphan Eap homologs EapH1 and EapH2, with inhibitory-constant values in the low-nanomolar range. Eap proteins are together essential for NSP inhibition by S. aureus in vitro and promote staphylococcal infection in vivo. The crystal structure of the EapH1/NE complex showed that Eap molecules constitute a unique class of noncovalent protease inhibitors that occlude the catalytic cleft of NSPs. These findings increase our insights into the complex pathogenesis of S. aureus infections and create opportunities to design novel treatment strategies for inflammatory conditions related to excessive NSP activity. PMID:25161283
Factors that influence the use and perceptions of employee assistance programs at six worksites.
French, M T; Dunlap, L J; Roman, P M; Steele, P D
1997-10-01
Employee assistance programs (EAPs) have gained significant importance in contemporary worksites. This article uses data from 6 case studies to examine several research questions regarding the relationship between worker demographic (e.g., gender, job tenure, and marital status), substance use, and workplace policies and the actual and potential use of the company EAP. Unlike in most of the existing literature, the authors did not find that gender, marital status, or job dissatisfaction are statistically related to actual or potential EAP use at most worksites. However, job tenure and some substance use behaviors were related to actual EAP use in a positive and statistically significant way. Another important finding, underlying the credible integration of EAPs into worksite culture, is the positive and robust relationship between employee trust and confidence in the EAP and actual use. The results of our study both reinforce some long-established principles in the EAP field and encourage further consideration of other beliefs.
Integrated EAP/Managed Behavioral Health Plan Utilization by Persons with Substance Use Disorders
Levy Merrick, Elizabeth S.; Hodgkin, Dominic; Hiatt, Deirdre; Horgan, Constance M.; Greenfield, Shelly F.; McCann, Bernard
2011-01-01
New federal parity and health reform legislation, promising increased behavioral health care access and a focus on prevention, has heightened interest in employee assistance programs (EAPs). This study investigated service utilization by persons with a primary substance use disorder (SUD) diagnosis in a managed behavioral healthcare organization's integrated EAP/managed behavioral health care product (N=1,158). In 2004, 25.0% of clients used the EAP first for new treatment episodes. After initial EAP utilization, 44.4% received no additional formal services through the plan and 40.4% received regular outpatient services. Overall, outpatient care, intensive outpatient/day treatment, and inpatient/residential detoxification were most common. About half of clients had co-occurring psychiatric diagnoses. Mental health service utilization was extensive. Findings suggest that for service users with primary SUD diagnoses in an integrated EAP/MBHC product, the EAP benefit plays a key role at the front end of treatment and is often only one component of treatment episodes. PMID:21185684
Key handling in wireless sensor networks
NASA Astrophysics Data System (ADS)
Li, Y.; Newe, T.
2007-07-01
With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.
Employee assistance programs in the new millennium.
Masi, Dale A
2005-01-01
This article presents an overall view of Employee Assistance Programs (EAPs). Beginning with the history, this article describes various models and essential ingredients of EAPs. It then discusses current trends including integration with Work/Life, web-based services, EAP accreditation, and the growth of international programs. Several issues are discussed including the need for licensing done nationally rather than by states and the effect the lack of substance abuse and brief counseling education has had on the delivery of EAP services. Future directions for EAPs emphasize the importance of quality assurance and the development of performance measurements, performance guarantees, and outcome measurements. The formation of the Alliance for Employee Assistance Advancement, an organization of organizations, completes the description and shows a new direction for EAPs in the next millennium.
Electroactive Polymers as Artificial Muscles - Reality and Challenges
NASA Technical Reports Server (NTRS)
Bar-Cohen, Y.
2001-01-01
Electroactive Polymers (EAPs) are emerging as effective displacement actuators. These materials offer the closest resemblance of biological muscle potentially enabling unique capabilities changing the paradigm about robots construction. Under a NASA task, several EAP driven mechanisms were developed including dust wiper, gripper, and robotic arm EAP are inducing a low actuation force limiting the applications that can use their current capability. In recognition of this limitation a series of international forums were established including SPIE conference, Webhub, Newsletter, and Newsgroup. A challenge was posed to the EAP community to have an arm wrestling between robot that is equipped with EAP actuators and human.
Employee assistance programs: an employer's guide to emerging liability issues.
Parliman, G C; Edwards, E L
1992-01-01
Increasing numbers of employers are implementing employee assistance programs (EAPs) designed to assist employees with personal issues that affect their work performance. Studies show that EAPs can dramatically increase employee productivity, but the benefits from EAPs have been accompanied by a less welcome development: lawsuits filed against employers by employees who allege that they suffered harm in the course of obtaining services through their employers' EAPs. Although the potential for liability will always exist, the employer that adheres to certain guidelines will be able to minimize its risk and make its EAP well worth the investment.
EDITORIAL: Electroactive polymer materials
NASA Astrophysics Data System (ADS)
Bar-Cohen, Yoseph; Kim, Kwang J.; Ryeol Choi, Hyouk; Madden, John D. W.
2007-04-01
Imitating nature's mechanisms offers enormous potential for the improvement of our lives and the tools we use. This field of the study and imitation of, and inspiration from, nature's methods, designs and processes is known as biomimetics. Artificial muscles, i.e. electroactive polymers (EAPs), are one of the emerging technologies enabling biomimetics. Polymers that can be stimulated to change shape or size have been known for many years. The activation mechanisms of such polymers include electrical, chemical, pneumatic, optical and magnetic. Electrical excitation is one of the most attractive stimulators able to produce elastic deformation in polymers. The convenience and practicality of electrical stimulation and the continual improvement in capabilities make EAP materials some of the most attractive among activatable polymers (Bar-Cohen Y (ed) 2004 Electroactive Polymer (EAP) Actuators as Artificial Muscles—Reality, Potential and Challenges 2nd edn, vol PM136 (Bellingham, WA: SPIE Press) pp 1-765). As polymers, EAP materials offer many appealing characteristics that include low weight, fracture tolerance and pliability. Furthermore, they can be configured into almost any conceivable shape and their properties can be tailored to suit a broad range of requirements. These capabilities and the significant change of shape or size under electrical stimulation while being able to endure many cycles of actuation are inspiring many potential possibilities for EAP materials among engineers and scientists in many different disciplines. Practitioners in biomimetics are particularly excited about these materials since they can be used to mimic the movements of animals and insects. Potentially, mechanisms actuated by EAPs will enable engineers to create devices previously imaginable only in science fiction. For many years EAP materials received relatively little attention due to their poor actuation capability and the small number of available materials. In the last fifteen years, a series of new materials have emerged that exhibit large displacement in response to electrical stimulation. This capability is making them highly attractive as actuators for their operational similarity to biological muscles, particularly their resilience, quiet operation, damage tolerance and ability to induce large actuation strains (stretching, contracting or bending). The application of these materials as actuators involves multi-disciplines including materials, electromechanics, chemistry, computers and electronics. Even though the force of actuation of existing EAP materials and their robustness requires further improvement, there has already been a series of reported successes in the development of EAP-actuated mechanisms. Using EAP to replace existing actuators may be a difficult challenge and therefore it is highly desirable to identify a niche application where EAP materials would not need to compete with existing technologies. EAP materials can be divided into two major groups based on their activation mechanism: ionic or electronic. Electronic EAPs, such as electrostrictive, electrostatic, piezoelectric and ferroelectric, are driven by Coulomb forces. These types of EAP material can be made to hold the induced displacement while activated under a DC voltage, allowing them to be considered for robotic applications. These materials have high mechanical energy density and they can be operated in air with no major constraints. However, electronic EAPs require high activation fields (>10 V/μm) that are close to the breakdown level. In contrast to electronic EAPs, ionic EAPs are materials that involve the transport of ions and they consist of two electrodes and an electrolyte. The activation of ionic EAPs can be achieved by voltages as low as 1-2 volts. Examples of ionic EAPs include gels, polymer-metal composites, conducting polymers and carbon nanotubes. Their disadvantages are a need to maintain wetness and their low electromechanical coupling. Turning EAP materials into actuators-of-choice requires a well established infrastructure. This involves improving the understanding of the basic principles that drive the various EAP materials. It is also necessary to develop a comprehensive material science, as well as effective electro-mechanics analytical tools and material processing techniques. Efforts are underway to study the parameters that control EAP electro-activation force and deformation and many successes have been reported. The processes of synthesizing, fabricating, electroding, shaping and handling are being refined to maximize the actuation capability and robustness of EAP materials. Methods of reliably characterizing the response of these materials are being developed and efforts are being made to establish a database with documented material properties in order to support design engineers who are considering the use of these materials. Grand challenge for the development of EAP-actuated robotics. The technology of artificial muscles is still in its emerging stages but the increased resources, growing number of investigators conducting research related to EAP, and improved collaboration among developers, users and sponsors are leading to rapid advances in this field. In 1999, in an effort to promote worldwide development towards the realization of the potential of EAP materials, Yoseph Bar-Cohen posed an arm-wrestling challenge (http://ndeaa.jpl.nasa.gov/nasa-nde/lommas/eap/EAP-armwrestling.htm). A graphic rendering of this challenge is illustrated in the above figure. In posing this challenge, he is seeking to see an EAP-activated robotic arm win against a human in a wrestling match in order to provide a gauge of the level of advances in the development of these materials. Success in wrestling against humans will enable capabilities that are currently considered impossible. It would allow applying EAP materials to improve many aspects of our life where some of the possibilities include effective implants and prosthetics, active clothing and realistic biologically inspired robots, as well as fabricating products with unmatched capabilities and dexterity. The first arm-wrestling match against a human (a 17 year-old female high school student) was held on 7 March 2005 as part of the EAP-in-Action session of SPIE's EAPAD conference. Three robotic arms participated in the contest and the girl won against all these arms. Subsequent contests are now focusing on measuring the performance of the robotic arms compared to the student performance that was recorded in the 2006 contest. In a future conference, once advances in developing such arms reach a sufficiently high level, a professional wrestler will be invited for the next human/machine wrestling match. This issue of the journal is dedicated to publishing recent research advances in the field of EAPs and is the first such dedicated issue ever to be published. The included papers cover the whole spectrum of elements considered critical to the development of the EAP technology infrastructure. The issue ends with a paper from the research group at EMPA describing their work on one of the first three arms that participated in the first historical arm-wrestling match. In the coming year the editors are hoping to see a significant growth in the amount of research and related publications addressing the many challenges that this field still poses.
Multiple Object Based RFID System Using Security Level
NASA Astrophysics Data System (ADS)
Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha
2007-12-01
RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.
ERIC Educational Resources Information Center
Atai, Mahmood Reza; Dashtestani, Reza
2013-01-01
English for academic purposes (EAP) has established itself as a considerable part of English as a foreign language (EFL) instruction in Iranian universities. Considering the Internet as a major educational source in EAP reading courses, it is highly important that the stakeholders have positive attitudes toward it and be aware of promises and…
Electro-Active Polymer (EAP) Actuators for Planetary Applications
NASA Technical Reports Server (NTRS)
Bar-Cohen, Y.; Leary, S.; Shahinpoor, M.; Harrison, J. O.; Smith, J.
1999-01-01
NASA is seeking to reduce the mass, size, consumed power, and cost of the instrumentation used in its future missions. An important element of many instruments and devices is the actuation mechanism and electroactive polymers (EAP) are offering an effective alternative to current actuators. In this study, two families of EAP materials were investigated, including bending ionomers and longitudinal electrostatically driven elastomers. These materials were demonstrated to effectively actuate manipulation devices and their performance is being enhanced in this on-going study. The recent observations are reported in this paper, include the operation of the bending-EAP at conditions that exceed the harsh environment on Mars, and identify the obstacles that its properties and characteristics are posing to using them as actuators. Analysis of the electrical characteristics of the ionomer EAP showed that it is a current driven material rather than voltage driven and the conductivity distribution on the surface of the material greatly influences the bending performance. An accurate equivalent circuit modeling of the ionomer EAP performance is essential for the design of effective drive electronics. The ionomer main limitations are the fact that it needs to be moist continuously and the process of electrolysis that takes place during activation. An effective coating technique using a sprayed polymer was developed extending its operation in air from a few minutes to about four months. The coating technique effectively forms the equivalent of a skin to protect the moisture content of the ionomer. In parallel to the development of the bending EAP, the development of computer control of actuated longitudinal EAP has been pursued. An EAP driven miniature robotic arm was constructed and it is controlled by a MATLAB code to drop and lift the arm and close and open EAP fingers of a 4-finger gripper. Keywords: Miniature Robotics, Electroactive Polymers, Electroactive Actuators, EAP Materials
Action potential propagation recorded from single axonal arbors using multi-electrode arrays.
Tovar, Kenneth R; Bridges, Daniel C; Wu, Bian; Randall, Connor; Audouard, Morgane; Jang, Jiwon; Hansma, Paul K; Kosik, Kenneth S
2018-04-11
We report the presence of co-occurring extracellular action potentials (eAPs) from cultured mouse hippocampal neurons among groups of planar electrodes on multi-electrode arrays (MEAs). The invariant sequences of eAPs among co-active electrode groups, repeated co-occurrences and short inter-electrode latencies are consistent with action potential propagation in unmyelinated axons. Repeated eAP co-detection by multiple electrodes was widespread in all our data records. Co-detection of eAPs confirms they result from the same neuron and allows these eAPs to be isolated from all other spikes independently of spike sorting algorithms. We averaged co-occurring events and revealed additional electrodes with eAPs that would otherwise be below detection threshold. We used these eAP cohorts to explore the temperature sensitivity of action potential propagation and the relationship between voltage-gated sodium channel density and propagation velocity. The sequence of eAPs among co-active electrodes 'fingerprints' neurons giving rise to these events and identifies them within neuronal ensembles. We used this property and the non-invasive nature of extracellular recording to monitor changes in excitability at multiple points in single axonal arbors simultaneously over several hours, demonstrating independence of axonal segments. Over several weeks, we recorded changes in inter-electrode propagation latencies and ongoing changes in excitability in different regions of single axonal arbors. Our work illustrates how repeated eAP co-occurrences can be used to extract physiological data from single axons with low electrode density MEAs. However, repeated eAP co-occurrences leads to over-sampling spikes from single neurons and thus can confound traditional spike-train analysis.
Electroactive polymer (EAP) actuators for planetary applications
NASA Astrophysics Data System (ADS)
Bar-Cohen, Yoseph; Leary, Sean P.; Shahinpoor, Mohsen; Harrison, Joycelyn S.; Smith, J.
1999-05-01
NASA is seeking to reduce the mass, size, consumed power, and cost of the instrumentation used in its future missions. An important element of many instruments and devices is the actuation mechanism and electroactive polymers (EAP) are offering an effective alternative to current actuators. In this study, two families of EAP materials were investigated, including bending ionomers and longitudinal electrostatically driven elastomers. These materials were demonstrated to effectively actuate manipulation devices and their performance is being enhanced in this on-going study. The recent observations are reported in this paper, include the operation of the bending-EAP at conditions that exceed the harsh environment on Mars, and identify the obstacles that its properties and characteristics are posing to using them as actuators. Analysis of the electrical characteristics of the ionomer EAP showed that it is a current driven material rather than voltage driven and the conductivity distribution on the surface of the material greatly influences the bending performance. An accurate equivalent circuit modeling of the ionomer EAP performance is essential for the design of effective drive electronics. The ionomer main limitations are the fact that it needs to be moist continuously and the process of electrolysis that takes place during activation. An effective coating technique using a sprayed polymer was developed extending its operation in air from a few minutes to about four months. The coating technique effectively forms the equivalent of a skin to protect the moisture content of the ionomer. In parallel to the development of the bending EAP, the development of computer control of actuated longitudinal EAP has been pursued. An EAP driven miniature robotic arm was constructed and it is controlled by a MATLAB code to drop and lift the arm and close and open EAP fingers of a 4-finger gripper.
Zimmerling, Martin J; Hochmair, Erwin S
2002-04-01
Objective measurements can be helpful for cochlear implant fitting of difficult populations, as for example very young children. One method, the recording of the electrically evoked compound action potential (EAP), measures the nerve recruitment in the cochlea in response to stimulation through the implant. For coding strategies implemented at a moderate stimulation rate of 250 pps per channel, useful correlations between EAP data and psychophysical data have been already found. With new systems running at higher rates, it is important to check these correlations again. This study investigates the correlations between psychophysical data and EAP measures calculated from EAP amplitude growth functions. EAP data were recorded in 12 Ineraid subjects. Additionally, behavioral thresholds (THR) and maximum acceptable loudness levels (MAL) were determined for stimulation rates of 80 pps and 2,020 pps for each electrode. Useful correlations between EAP data and psychophysical data were found at the low stimulation rate (80 pps). However, at the higher stimulation rate (2,020 pps) correlations were not significant. They were improved substantially, however, by introducing a factor that corrected for disparities due to temporal integration. Incorporation of this factor, which controls for the influence of the stimulation rate on the threshold, improved the correlations between EAP measures recorded at 80 pps and psychophysical MALs measured at 2,020 pps to better than r = 0.70. EAP data as such can only be used to predict behavioral THRs or MCLs at low stimulation rates. To cope with temporal integration effects at higher stimulation rates, EAP data must be rate corrected. The introduction of a threshold-rate-factor is a promising way to achieve that goal. Further investigations need to be performed.
ERIC Educational Resources Information Center
Hahn, Andrew B.
2005-01-01
Employee assistance programs, or EAPs, are an employee benefit designed to help workers meet their work and family needs. However, questions have been raised about the design, utilization, and scale of services that EAPs make possible for low-wage workers. This article explores whether on college campuses an EAP benefit can simultaneously meet the…
NASA Astrophysics Data System (ADS)
Nikolopoulos, Georgios M.
2018-01-01
We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.
Practical quantum digital signature
NASA Astrophysics Data System (ADS)
Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing
2016-03-01
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.
NASA Astrophysics Data System (ADS)
Hanson, David F.
2017-04-01
Bio-inspired intelligent robots are coming of age in both research and industry, propelling market growth for robots and A.I. However, conventional motors limit bio-inspired robotics. EAP actuators and sensors could improve the simplicity, compliance, physical scaling, and offer bio-inspired advantages in robotic locomotion, grasping and manipulation, and social expressions. For EAP actuators to realize their transformative potential, further innovations are needed: the actuators must be robust, fast, powerful, manufacturable, and affordable. This presentation surveys progress, opportunities, and challenges in the author's latest work in social robots and EAP actuators, and proposes a roadmap for EAP actuators in bio-inspired intelligent robotics.
Blind quantum computation with identity authentication
NASA Astrophysics Data System (ADS)
Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong
2018-04-01
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
NASA Technical Reports Server (NTRS)
Xu, Tian-Bing; Su, Ji; Jiang, Xiaoning; Rehrig, Paul W.; Zhang, Shujun; Shrout, Thomas R.; Zhang, Qiming
2006-01-01
An electroactive polymer (EAP)-ceramic hybrid actuation system (HYBAS) was developed recently at NASA Langley Research Center. This paper focuses on the effect of the bending stiffness of the EAP component on the performance of a HYBAS, in which the actuation of the EAP element can match the theoretical prediction at various length/thickness ratios for a constant elastic modulus of the EAP component. The effects on the bending stiffness of the elastic modulus and length/thickness ratio of the EAP component were studied. A critical bending stiffness to keep the actuation of the EAP element suitable for a rigid beam theory-based modeling was found for electron irradiated P(VDF-TrFE) copolymer. For example, the agreement of experimental data and theoretical modeling for a HYBAS with the length/thickness ratio of EAP element at 375 times is demonstrated. However, the beam based theoretical modeling becomes invalid (i.e., the profile of the HYBAS movement does not follow the prediction of theoretical modeling) when the bending stiffness is lower than a critical value.
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
Harraghy, Niamh; Homerova, Dagmar; Herrmann, Mathias; Kormanec, Jan
2008-01-01
Mapping the transcription start points of the eap, emp, and vwb promoters revealed a conserved octanucleotide sequence (COS). Deleting this sequence abolished the expression of eap, emp, and vwb. However, electrophoretic mobility shift assays gave no evidence that this sequence was a binding site for SarA or SaeR, known regulators of eap and emp.
The role of the EAP in the identification and treatment of substance abuse.
Kramer, R M
1998-12-01
Employee Assistance Programs (EAPs) are cost-effective strategies for employers to contain the substantial direct and indirect costs of substance abuse in the workplace. EAPs offer prevention, early detection, assessment of referral, and after-care programs to help stem the enormous costs of substance abuse in the workplace. Most effective employer substance abuse programs integrate drug-testing and EAP services to ensure a well coordinated, cost-effective program.
Bennett, J B; Lehman, W E
2001-07-01
Employees fail to seek help for alcohol or drug (AOD) abuse because of unhealthy work climates, stigma, and distrust in Employee Assistance Programs (EAPs). To address such problems, the authors randomly assigned groups of municipal employees (N = 260) to 2 types of training: a 4-hr informational review of EAPs and policy and an 8-hr training that embedded messages about AOD reduction in the context of team building and stress management. Pre- and posttraining and 6-month follow-up surveys assessed change. Group privacy regulation, EAP trust, help seeking, and peer encouragement increased for team training. Stigma of substance users decreased for information training. EAP/policy knowledge increased for both groups. A control group showed little change. Help seeking and peer encouragement also predicted EAP utilization. Integrating both team and informational training may be the most effective for improving help seeking and EAP utilization.
Cost of employee assistance programs: comparison of national estimates from 1993 and 1995.
French, M T; Zarkin, G A; Bray, J W; Hartwell, T D
1999-02-01
The cost and financing of mental health services is gaining increasing importance with the spread of managed care and cost-cutting measures throughout the health care system. The delivery of mental health services through structured employee assistance programs (EAPs) could be undermined by revised health insurance contracts and cutbacks in employer-provided benefits at the workplace. This study uses two recently completed national surveys of EAPs to estimate the costs of providing EAP services during 1993 and 1995. EAP costs are determined by program type, worksite size, industry, and region. In addition, information on program services is reported to determine the most common types and categories of services and whether service delivery changes have occurred between 1993 and 1995. The results of this study will be useful to EAP managers, mental health administrators, and mental health services researchers who are interested in the delivery and costs of EAP services.
Automating Security Protocol Analysis
2004-03-01
language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java
Wen, Fengtong
2013-12-01
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
Controlled mutual quantum entity authentication with an untrusted third party
NASA Astrophysics Data System (ADS)
Kang, Min-Sung; Heo, Jino; Hong, Chang-Ho; Yang, Hyung-Jin; Han, Sang-Wook; Moon, Sung
2018-07-01
We propose a quantum control entity mutual authentication protocol that can be executed in environments involving an untrusted third party. In general, the third party, referred to as Charlie, can be an entity such as a telephone company, server, financial company, or login webpage for a portal service. Most communication protocols controlled by third parties are vulnerable to internal attacks. In this study, we present two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.
Theoretical Study on Nano-Catalyst Burn Rate
2014-11-26
the adsorbed system EAP +surface and the adsorption state, with a positive value of Eads being thermodynamically favorable: Eads = (Esurface + EAP ... EAP +surface, (1) The interaction between the TiO2 surfaces and the AP molecules has been analyzed by
Information Management and Employee Assistance Program Imperatives.
ERIC Educational Resources Information Center
Bickerton, Richard
1987-01-01
The ALMACA Clearinghouse for Employee Assistance Program (EAP) Information collects and disseminates EAP-specific data to provide subscribers with information to maintain their own competence and to improve upon the understanding and use of EAP practices and procedures. (JOW)
Confidentiality and the employee assistance program professional.
Mistretta, E F; Inlow, L B
1991-02-01
During the last two decades EAPs have offered employees confidential assessment, counseling, and referral. Many occupational health nurses have taken on the role of EAP professional or function as the liaison between the EAP counselor and the employee. The occupational health nurse involved in any EAP issue must adhere to the standards of confidentiality. The federal and state laws, company policy, and professional codes of ethics regarding these clients must be clearly understood, especially related to the issue of confidentiality.
NASA Astrophysics Data System (ADS)
Wang, Jiabao; Wen, Zhiping; Wu, Renguang; Guo, Yuanyuan; Chen, Zesheng
2016-06-01
The East Asia-Pacific (EAP) pattern is a well-known meridional teleconnection over East Asia during boreal summer. In this study, the mechanism for growth of the EAP on intraseasonal timescale is investigated through a vorticity budget. It is found that the beta-effect and high-frequency transient eddies have primary contributions to the growth of the low-frequency EAP. The former leads to a westward shift of disturbances associated with the low-frequency EAP and the latter favors an amplification of disturbances, respectively. The interaction between low-frequency disturbances and zonal flow has a damping effect by dragging disturbances eastward. The impact of boreal summer intraseasonal oscillation (BSISO) on the triggering of the low-frequency EAP is also examined in this study based on observational analysis and a linear model experiment. It is shown that an elongated anomalous convection band located in the vicinity of Philippines associated with the dominant mode of BSISO has a significant impact on the initiation of low-frequency EAP via Rossby wave propagation, whereas anomalous convection located over the North Indian Ocean has a limited impact. Based on the results of present study, the low-frequency EAP could be a self-sustained mode, and the BSISO plays a substantial role in triggering the low-frequency EAP.
The Severity of Retinal Degeneration in Rp1h Gene-Targeted Mice Is Dependent on Genetic Background
Liu, Qin; Saveliev, Alexei; Pierce, Eric A.
2009-01-01
Purpose The severity of disease in patients with retinitis pigmentosa (RP) can vary significantly, even among patients with the same primary mutations. It is hypothesized that modifier genes play important roles in determining the severity of RP, including the retinitis pigmentosa 1 (RP1) form of disease. To investigate the basis of variation in disease expression for RP1 disease, the authors generated congenic mice with a gene-targeted retinitis pigmentosa 1 homolog (Rp1h) allele (Rp1htm1Eap) on several different genetic backgrounds and analyzed their retinal phenotypes. Methods The Rp1htm1Eap allele was placed onto the C57BL/6J, DBA1/J, and A/J backgrounds. Retinal function of the resultant congenic mice was evaluated using electroretino-graphic analyses. Retinal structure and ultrastructure were evaluated using light and electron microscopy. Rp1h protein location was determined with immunofluorescence microscopy. Results Analysis of the retinal phenotype of incipient congenic (N6) B6.129S-Rp1h+/tm1Eap, DBA.129S(B6)-Rp1h+/tm1Eap, and A.129S(B6)-Rp1h+/tm1Eap mice at 1 year of age showed retinal degeneration only in the A.129S(B6)-Rp1h+/tm1Eap mice. Further analyses revealed that the photoreceptors of the fully congenic A.129S(B6)-Rp1h+/tm1Eap mice show evidence of degeneration at 6 months of age and are almost completely lost by 18 months of age. In contrast, the photoreceptor cells in the fully congenic B6.129S-Rp1h+/tm1Eap mice remain healthy up to 18 months. Conclusions The severity of the retinal degeneration caused by the Rp1htm1Eap allele is notably dependent on genetic background. The development and characterization of the B6.129S-Rp1h+/tm1Eap and A.129S(B6)-Rp1h+/tm1Eap congenic mouse lines will facilitate identification of sequence alterations in genes that modify the severity of RP1 disease. PMID:19060274
The severity of retinal degeneration in Rp1h gene-targeted mice is dependent on genetic background.
Liu, Qin; Saveliev, Alexei; Pierce, Eric A
2009-04-01
The severity of disease in patients with retinitis pigmentosa (RP) can vary significantly, even among patients with the same primary mutations. It is hypothesized that modifier genes play important roles in determining the severity of RP, including the retinitis pigmentosa 1 (RP1) form of disease. To investigate the basis of variation in disease expression for RP1 disease, the authors generated congenic mice with a gene-targeted retinitis pigmentosa 1 homolog (Rp1h) allele (Rp1h(tm1Eap)) on several different genetic backgrounds and analyzed their retinal phenotypes. The Rp1h(tm1Eap) allele was placed onto the C57BL/6J, DBA1/J, and A/J backgrounds. Retinal function of the resultant congenic mice was evaluated using electroretinographic analyses. Retinal structure and ultrastructure were evaluated using light and electron microscopy. Rp1h protein location was determined with immunofluorescence microscopy. Analysis of the retinal phenotype of incipient congenic (N6) B6.129S-Rp1h(+/tm1Eap), DBA.129S(B6)-Rp1h(+/tm1Eap), and A.129S(B6)-Rp1h(+/tm1Eap) mice at 1 year of age showed retinal degeneration only in the A.129S(B6)-Rp1h(+/tm1Eap) mice. Further analyses revealed that the photoreceptors of the fully congenic A.129S(B6)-Rp1h(+/tm1Eap) mice show evidence of degeneration at 6 months of age and are almost completely lost by 18 months of age. In contrast, the photoreceptor cells in the fully congenic B6.129S-Rp1h(+/tm1Eap) mice remain healthy up to 18 months. The severity of the retinal degeneration caused by the Rp1h(tm1Eap) allele is notably dependent on genetic background. The development and characterization of the B6.129S-Rp1h(+/tm1Eap) and A.129S(B6)-Rp1h(+/tm1Eap) congenic mouse lines will facilitate identification of sequence alterations in genes that modify the severity of RP1 disease.
Employee Assistance Programs in the 1980s: Expanding Career Options for Counselors.
ERIC Educational Resources Information Center
Forrest, Donald V.
1983-01-01
Suggests that Employee Assistance Programs (EAPS) offer new and expanded work opportunities for counselors. Reviews the history of EAPS, current philosophy and program components, and implications for counselors as EAPs move from crisis intervention toward prevention. (JAC)
Sever-Chroneos, Zvjezdana; Krupa, Agnieszka; Davis, Jeremy; Hasan, Misbah; Yang, Ching-Hui; Szeliga, Jacek; Herrmann, Mathias; Hussain, Muzafar; Geisbrecht, Brian V.; Kobzik, Lester; Chroneos, Zissis C.
2011-01-01
Staphylococcus aureus causes life-threatening pneumonia in hospitals and deadly superinfection during viral influenza. The current study investigated the role of surfactant protein A (SP-A) in opsonization and clearance of S. aureus. Previous studies showed that SP-A mediates phagocytosis via the SP-A receptor 210 (SP-R210). Here, we show that SP-R210 mediates binding and control of SP-A-opsonized S. aureus by macrophages. We determined that SP-A binds S. aureus through the extracellular adhesin Eap. Consequently, SP-A enhanced macrophage uptake of Eap-expressing (Eap+) but not Eap-deficient (Eap−) S. aureus. In a reciprocal fashion, SP-A failed to enhance uptake of Eap+ S. aureus in peritoneal Raw264.7 macrophages with a dominant negative mutation (SP-R210(DN)) blocking surface expression of SP-R210. Accordingly, WT mice cleared infection with Eap+ but succumbed to sublethal infection with Eap- S. aureus. However, SP-R210(DN) cells compensated by increasing non-opsonic phagocytosis of Eap+ S. aureus via the scavenger receptor scavenger receptor class A (SR-A), while non-opsonic uptake of Eap− S. aureus was impaired. Macrophages express two isoforms: SP-R210L and SP-R210S. The results show that WT alveolar macrophages are distinguished by expression of SP-R210L, whereas SR-A−/− alveolar macrophages are deficient in SP-R210L expressing only SP-R210S. Accordingly, SR-A−/− mice were highly susceptible to both Eap+ and Eap− S. aureus. The lungs of susceptible mice generated abnormal inflammatory responses that were associated with impaired killing and persistence of S. aureus infection in the lung. In conclusion, alveolar macrophage SP-R210L mediates recognition and killing of SP-A-opsonized S. aureus in vivo, coordinating inflammatory responses and resolution of S. aureus pneumonia through interaction with SR-A. PMID:21123169
Eisenbeis, Janina; Peisker, Henrik; Backes, Christian S; Bur, Stephanie; Hölters, Sebastian; Thewes, Nicolas; Greiner, Markus; Junker, Christian; Schwarz, Eva C; Hoth, Markus; Junker, Kerstin; Preissner, Klaus T; Jacobs, Karin; Herrmann, Mathias; Bischoff, Markus
2017-02-01
Staphyloccocus aureus is a major human pathogen and a common cause for superficial and deep seated wound infections. The pathogen is equipped with a large arsenal of virulence factors, which facilitate attachment to various eukaryotic cell structures and modulate the host immune response. One of these factors is the extracellular adherence protein Eap, a member of the "secretable expanded repertoire adhesive molecules" (SERAM) protein family that possesses adhesive and immune modulatory properties. The secreted protein was previously shown to impair wound healing by interfering with host defense and neovascularization. However, its impact on keratinocyte proliferation and migration, two major steps in the re-epithelialization process of wounds, is not known. Here, we report that Eap affects the proliferation and migration capacities of keratinocytes by altering their morphology and adhesive properties. In particular, treatment of non-confluent HaCaT cell cultures with Eap resulted in cell morphology changes as well as a significant reduction in cell proliferation and migration. Eap-treated HaCaT cells changed their appearance from an oblong via a trapezoid to an astral-like shape, accompanied by decreases in cell volume and cell stiffness, and exhibited significantly increased cell adhesion. Eap had a similar influence on endothelial and cancer cells, indicative for a general effect of Eap on eukaryotic cell morphology and functions. Specifically, Eap was found to interfere with growth factor-stimulated activation of the mitogen-activated protein kinase (MAPK) pathway that is known to be responsible for cell shape modulation, induction of proliferation and migration of epithelial cells. Western blot analyses revealed that Eap blocked the phosphorylation of extracellular signal-regulated kinase 1 and 2 (Erk1/2) in keratinocyte growth factor (KGF)-stimulated HaCaT cells. Together, these data add another antagonistic mechanism of Eap in wound healing, whereby the bacterial protein interferes with keratinocyte migration and proliferation. Copyright © 2017 Elsevier GmbH. All rights reserved.
Nakao, Mutsuhiro; Nishikitani, Mariko; Shima, Satoru; Yano, Eiji
2007-11-01
Depression and suicide-related behaviours are important issues for workers, and the number of Japanese companies contracting with the Employee Assistance Programme (EAP) to promote employees' mental health has recently increased. However, no longitudinal studies have reported that the EAP maintains or improves the overall level of depression among employees qualitatively. Thus, we attempted to assess the impact of the EAP on depression and suicide-related behaviours in the workplace. A cohort study was conducted on 283 male Japanese employees aged 22-38 years at a Japanese information-technology company introducing the EAP. Because the privacy policy of the EAP service made it difficult to perform a randomised design in the workplace, 22 men working at an affiliated company without the EAP were used as a reference group. All the subjects completed the 17-item Hamilton Depression Scale (HAM-D) and Job Content Questionnaire (JCQ) consisting of job demands, control, and social support before the EAP was introduced to establish a baseline and after 2 years. In the EAP group, the total HAM-D scores significantly decreased after the 2-year study period (P=0.0011); the changes in the scores of the five HAM-D items (i.e., suicidal thoughts, agitation, psychomotor retardation, guilt, and depressed mood) were significant. Specifically, 19 (86%) of the 22 workers with a positive response to the suicidal thoughts item (i.e., score >or= 1) at baseline reported that they no longer had suicidal thoughts (i.e., score=0) after the 2 year study period. No significant changes were observed in the reference group. The three JCQ scores were not significantly different between the baseline and after the 2 year study period in both groups. Although further studies are needed, EAPs may be a promising strategy for maintaining the good mental health of workers.
Hussain, Muzaffar; Haggar, Axana; Heilmann, Christine; Peters, Georg; Flock, Jan-Ingmar; Herrmann, Mathias
2002-06-01
To initiate invasive infection, Staphylococcus aureus must adhere to host substrates, such as the extracellular matrix or eukaryotic cells, by virtue of different surface proteins (adhesins). Recently, we identified a 60-kDa cell-secreted extracellular adherence protein (Eap) of S. aureus strain Newman with broad-spectrum binding characteristics (M. Palma, A. Haggar, and J. I. Flock, J. Bacteriol. 181:2840-2845, 1999), and we have molecularly confirmed Eap to be an analogue of the previously identified major histocompatibility complex class II analog protein (Map) (M. Hussain, K. Becker, C. von Eiff, G. Peter, and M. Herrmann, Clin. Diagn. Lab. Immunol. 8:1281-1286, 2001). Previous analyses of the Eap/Map function performed with purified protein did not allow dissection of its precise role in the complex situation of the staphylococcal whole cell presenting several secreted and wall-bound adhesins. Therefore, the role of Eap was investigated by constructing a stable eap::ermB deletion in strain Newman and by complementation of the mutant. Patterns of extracted cell surface proteins analyzed both by sodium dodecyl sulfate-polyacrylamide gel electrophoresis and by Western ligand assays with various adhesive matrix molecules clearly confirmed the absence of Eap in the mutant. However, binding and adhesion tests using whole staphylococcal cells demonstrated that both the parent and mutant strains bound equally well to fibronectin- and fibrinogen-coated surfaces, possibly due to their recognition by other staphylococcal adhesins. Furthermore, Eap mediated staphylococcal agglutination of both wild-type and mutant cells. In contrast, the mutant adhered to a significantly lesser extent to cultured fibroblasts (P < 0.001) than did the wild type, while adherence was restorable upon complementation. Furthermore, adherence to both epithelial cells (P < 0.05) and fibroblasts (not significant) could be blocked with antibodies against Eap, whereas preimmune serum was not active. In conclusion, Eap may contribute to pathogenicity by promoting adhesion of whole staphylococcal cells to complex eukaryotic substrates.
sae is essential for expression of the staphylococcal adhesins Eap and Emp.
Harraghy, Niamh; Kormanec, Jan; Wolz, Christiane; Homerova, Dagmar; Goerke, Christiane; Ohlsen, Knut; Qazi, Saara; Hill, Philip; Herrmann, Mathias
2005-06-01
Eap and Emp are two Staphylococcus aureus adhesins initially described as extracellular matrix binding proteins. Eap has since emerged as being important in adherence to and invasion of eukaryotic cells, as well as being described as an immunomodulator and virulence factor in chronic infections. This paper describes the mapping of the transcription start point of the eap and emp promoters. Moreover, using reporter-gene assays and real-time PCR in defined regulatory mutants, environmental conditions and global regulators affecting expression of eap and emp were investigated. Marked differences were found in expression of eap and emp between strain Newman and the 8325 derivatives SH1000 and 8325-4. Moreover, both genes were repressed in the presence of glucose. Analysis of expression of both genes in various regulatory mutants revealed that sarA and agr were involved in their regulation, but the data suggested that there were additional regulators of both genes. In a sae mutant, expression of both genes was severely repressed. sae expression was also reduced in the presence of glucose, suggesting that repression of eap and emp in glucose-containing medium may, in part, be a consequence of a decrease in expression of sae.
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
Chen, Huifang; Ge, Linlin; Xie, Lei
2015-01-01
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
Chen, Huifang; Ge, Linlin; Xie, Lei
2015-07-14
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
Preparing marriage and family therapy students to become employee assistance professionals*.
Smith, T A; Salts, C J; Smith, C W
1989-10-01
While the number of Employee Assistance Programs (EAPs) has grown tremendously, opportunities for marriage and family therapists in EAP settings have not been adequately described. This paper addresses issues pertinent to training Marriage and Family Therapy (MFT) students to develop the skills needed to become EAP professionals. Qualifications for becoming an EAP professional are described and suggestions are made as to how these skills may be taught within the framework of an academically based MFT training program.
Self-Disclosure as a Predictor of EAP Supervisory Utilization
NASA Technical Reports Server (NTRS)
Donohoe, Timothy L.; Johnson, James T.; Taquino, Maurice A.
1999-01-01
The value of Employee Assistance Programs (EAPS) has been cited in a variety of published papers and articles. An important managerial element relative to the assessment and referral of troubled employees has been supervisory training. There has been numerous studies highlighting the various factors and circumstances associated with supervisory behavior and EAP referrals. The inclusion of emotional awareness factors in EAP supervisory utilization has not been thoroughly investigated, although frequently found in the literature as a training and development objective for managers in business and education. The present study sought to determine what role supervisory denial and anxiety avoidance plays in confrontation of troubled employees and if admission of specific, internal emotional events is a characteristic among EAP utilizing supervisors.
Employee assistance programs: a primer for buyer and seller.
Dixon, K
1988-06-01
A growing number of firms in private industry now sponsor or contract with groups of mental health professionals to provide employee assistance programs (EAPs). Factors that have influenced the increasing demand for EAPs include corporations' humanitarian concern for employees with mental health problems, a desire to contain rising health costs and reduce corporate losses, and the need for effective supervisory systems for managing troubled employees. To assist corporate consumers in judging the quality of EAP services and to guide mental health practitioners who wish to enter the EAP field, criteria are provided for evaluating the following aspects of EAP programs: policy development, employee orientation, supervisor training, availability during nonbusiness hours, assessment and diagnostic services, crisis counseling, referral, quality assurance, program evaluation, and cost.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.
14 CFR 120.115 - Employee Assistance Program (EAP).
Code of Federal Regulations, 2014 CFR
2014-01-01
... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS DRUG AND ALCOHOL TESTING PROGRAM Drug Testing Program Requirements § 120.115 Employee Assistance Program (EAP). (a... the employee and supervisor EAP training in the employer's drug testing program. [Doc. No. FAA-2008...
State Employee Assistance Programs: Organization and Services.
ERIC Educational Resources Information Center
Kemp, Donna R.
1985-01-01
Describes a study conducted to determine how many state governments had established employee assistance programs (EAPs). Results concerned how state EAPs are organized, services provided, cost of programs, what dollars or productive benefits were calculated, and what problems have been encountered by state EAPs. (CT)
Managing Employee Assistance Programmes.
ERIC Educational Resources Information Center
Schmidenberg, Olive C.; Cordery, John L.
1990-01-01
Interviews with 20 branch managers and 20 accountants in an Australian bank determined factors influencing the success of an employee assistance program (EAP). It was found that policies requiring supervisors to act against normal managerial practice doom EAPs to failure. Organizational analysis to integrate the EAP within existing organizational…
Merrick, Elizabeth S Levy; Hodgkin, Dominic; Hiatt, Deirdre; Horgan, Constance M; Greenfield, Shelly F; McCann, Bernard
2011-04-01
New federal parity and health reform legislation, promising increased behavioral health care access and a focus on prevention, has heightened interest in employee assistance programs (EAPs). This study investigated service utilization by persons with a primary substance use disorder (SUD) diagnosis in a managed behavioral health care (MBHC) organization's integrated EAP/MBHC product (N = 1,158). In 2004, 25.0% of clients used the EAP first for new treatment episodes. After initial EAP utilization, 44.4% received no additional formal services through the plan, and 40.4% received regular outpatient services. Overall, outpatient care, intensive outpatient/day treatment, and inpatient/residential detoxification were most common. About half of the clients had co-occurring psychiatric diagnoses. Mental health service utilization was extensive. Findings suggest that for service users with primary SUD diagnoses in an integrated EAP/MBHC product, the EAP benefit plays a key role at the front end of treatment and is often only one component of treatment episodes. Copyright © 2011 Elsevier Inc. All rights reserved.
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Bundle Security Protocol for ION
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher
2011-01-01
This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.
EAP and LLNP Students: Common Problems and Strategies
ERIC Educational Resources Information Center
Nguyen, Thi Minh Phuong
2010-01-01
As English learners originate from many cultural and language backgrounds, they come to class with different circumstances. This paper examines the backgrounds, common problems and solutions for English for Academic Purposes (EAP) students and Language, Literacy, and Numeracy Programme (LLNP) students. EAP students are from Meridian International…
Public Sector Employee Assistance Programs.
ERIC Educational Resources Information Center
Kemp, Donna R.; Verlinde, Beverly
This document discusses employee assistance programs (EAPs), programs which have been developed to help employees deal with personal problems that seriously affect job performance. It reviews literature which specifically addresses EAPs in the public sector, noting that there are no exact figures on how many public entities have EAPs. Previous…
Assistance Programs: A Timely Solution for the Adult Education Setting.
ERIC Educational Resources Information Center
Burns, Shannon M.
1998-01-01
Discusses the use of formal employee assistance programs (EAPs) with adult students who have personal problems that could affect their school performance. Looks at the differences between EAPs and traditional counseling services: EAPs have a written assistance policy; they institutionalize consistency; they are confidential. (JOW)
Genomics-Based Security Protocols: From Plaintext to Cipherprotein
NASA Technical Reports Server (NTRS)
Shaw, Harry; Hussein, Sayed; Helgert, Hermann
2011-01-01
The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.
Cryptanalysis of Controlled Mutual Quantum Entity Authentication Using Entanglement Swapping
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue
2017-01-01
By using GHZ-like states and entanglement swapping, Kang et al. [Chin. Phys. B 24 (2015) 090306] proposed a controlled mutual quantum entity authentication protocol. We find that the proposed protocol is not secure, that is, the center, Charlie can eavesdrop the secret keys shared between Alice and Bob without being detected. Supported by the 2014-year Program for Excellent Youth Talents in University of Anhui Province and the Talent Scientific Research Fundation of Tongling University under Grant No. 2015tlxyrc01 and the Program for Academic Leader Reserve Candidates in Tongling University under Grant No. 2014tlxyxs30
46 CFR 16.401 - Employee Assistance Program (EAP).
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Employee Assistance Program (EAP). 16.401 Section 16.401 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Employee Assistance Programs § 16.401 Employee Assistance Program (EAP). The employer shall provide an...
The Organization as Client: Broadening the Concept of Employee Assistance Programs.
ERIC Educational Resources Information Center
Googins, Bradley; Davidson, Bruce N.
1993-01-01
Notes that many employee assistance programs (EAPs) are broadening their function to address rapidly changing human and social issues of environments in which they operate, refocusing practice to include organization as the client. Discusses traditional EAP practice, evolution of EAPs, changes confronting corporations, and alternative model in…
The Effective Use of EAPs: Retrenchment Leads to Emphasis on Helping Troubled Employees.
ERIC Educational Resources Information Center
Pogue, Gregory
1994-01-01
During a period of retrenchment, colleges and universities are increasingly developing employee assistance programs (EAPs) to help personnel cope with personal and work-related problems. Successful EAPs have top management commitment, have written policies and procedure, focus on employee performance, provide professional assistance, involve the…
A Report of Employee Assistance Programs.
ERIC Educational Resources Information Center
Saint Louis Public Schools, MO.
The evaluation of employee assistance program (EAP) providers was designed to provide information necessary to the selection of an EAP provider for the Saint Louis Public Schools, Missouri. The most widely recognized functions of an EAP are to provide a confidential consultation to individuals with personal problems and to serve as a management…
School Employee Assistance Programs in New York State.
ERIC Educational Resources Information Center
Stevens, R. Craig
1986-01-01
The article reports on the following aspects of employee assistance programs (EAPs), which are designed to counter employee personal problems that could impair work performance: 1) administrative views on EAPs; 2) district ratings of EAPs; 3) funding; 4) types of problems handled; and 5) success of the programs. (PS)
Discourse Itineraries in an EAP Classroom: A Collaborative Critical Literacy Praxis
ERIC Educational Resources Information Center
Chun, Christian Wai
2010-01-01
This classroom ethnography documents the developing critical literacy pedagogy of an English for Academic Purposes (EAP) instructor over the course of several terms. My research, which involved extensive collaboration with the EAP instructor, explores how specific classroom practices and discourses are enacted and mediated through dialogic…
Characterization of bending EAP beams
NASA Technical Reports Server (NTRS)
Bao, Xiaoqi; Bar-Cohen, Yoseph; Chang, Zensheu; Sherrit, Stewart
2004-01-01
Electroactive polymers are attractive actuation materials because of their large deformation, flexibility, and lightweight. A CCD camera system was constructed to record the curved shapes of bending during the activation of EAP films and image-processing software was developed to digitize the bending curves. A computer program was developed to solve the invese problem of cantilever EAP beams with tip position limiter. using the developed program and acquired curves without tip position limiter as well as the corresponding tip force, the EAP material properties of voltage-strain sensitivity and Young's modulus were determined.
Shumway, Sterling T; Wampler, Richard S; Dersch, Charette; Arredondo, Rudy
2004-01-01
Marriage and family services have not been widely recognized as part of employee assistance programs (EAP), although family and relational problems are widely cited as sources of problems on the job. EAP clients (N = 800, 97% self-referred) indicated how much family, psychological/emotional, drug, alcohol, employment-related, legal, and medical problems troubled them and the need for services in each area. Psychological/emotional (66%) and family (65%) problem areas frequently were rated "considerable" or "extreme." Both areas were rated as "considerable" or "extreme" by 48.6% of participants. In view of the evidence that marriage and family services can be effective with both family and psychological/emotional problems, professionals who are competent to provide such services have much to offer EAP programs.
Hosseinbor, A. Pasha; Chung, Moo K.; Wu, Yu-Chien; Alexander, Andrew L.
2012-01-01
The ensemble average propagator (EAP) describes the 3D average diffusion process of water molecules, capturing both its radial and angular contents. The EAP can thus provide richer information about complex tissue microstructure properties than the orientation distribution function (ODF), an angular feature of the EAP. Recently, several analytical EAP reconstruction schemes for multiple q-shell acquisitions have been proposed, such as diffusion propagator imaging (DPI) and spherical polar Fourier imaging (SPFI). In this study, a new analytical EAP reconstruction method is proposed, called Bessel Fourier orientation reconstruction (BFOR), whose solution is based on heat equation estimation of the diffusion signal for each shell acquisition, and is validated on both synthetic and real datasets. A significant portion of the paper is dedicated to comparing BFOR, SPFI, and DPI using hybrid, non-Cartesian sampling for multiple b-value acquisitions. Ways to mitigate the effects of Gibbs ringing on EAP reconstruction are also explored. In addition to analytical EAP reconstruction, the aforementioned modeling bases can be used to obtain rotationally invariant q-space indices of potential clinical value, an avenue which has not yet been thoroughly explored. Three such measures are computed: zero-displacement probability (Po), mean squared displacement (MSD), and generalized fractional anisotropy (GFA). PMID:22963853
Model-free and analytical EAP reconstruction via spherical polar Fourier diffusion MRI.
Cheng, Jian; Ghosh, Aurobrata; Jiang, Tianzi; Deriche, Rachid
2010-01-01
How to estimate the diffusion Ensemble Average Propagator (EAP) from the DWI signals in q-space is an open problem in diffusion MRI field. Many methods were proposed to estimate the Orientation Distribution Function (ODF) that is used to describe the fiber direction. However, ODF is just one of the features of the EAP. Compared with ODF, EAP has the full information about the diffusion process which reflects the complex tissue micro-structure. Diffusion Orientation Transform (DOT) and Diffusion Spectrum Imaging (DSI) are two important methods to estimate the EAP from the signal. However, DOT is based on mono-exponential assumption and DSI needs a lot of samplings and very large b values. In this paper, we propose Spherical Polar Fourier Imaging (SPFI), a novel model-free fast robust analytical EAP reconstruction method, which almost does not need any assumption of data and does not need too many samplings. SPFI naturally combines the DWI signals with different b-values. It is an analytical linear transformation from the q-space signal to the EAP profile represented by Spherical Harmonics (SH). We validated the proposed methods in synthetic data, phantom data and real data. It works well in all experiments, especially for the data with low SNR, low anisotropy, and non-exponential decay.
Characteristics of an external employee assistance programme in Japan.
Muto, Takashi; Fujimori, Yuiko; Suzuki, Keiko
2004-12-01
Mental health care is now a major occupational health issue in Japan. Although realizing effective use of external employee assistance programmes (EAPs) has been identified as crucial for mental health care, few scientific papers describe or analyse the characteristics of EAPs in Japan. This study sought to clarify the characteristics of an external EAP in Japan. The characteristics of an external EAP were clarified in terms of programme description and utilization. A total of 10,260 counselling sessions from 1996 to 2000 were used for utilization analysis. The EAP studied had contracts with 133 organizations, half of which were health insurance societies. The EAP provided employees and family members with free, confidential counselling. Annual mean utilization rate per 1000 individuals increased from 1.3 in 1996 to 2.7 in 2000. Less than one-third of counselling sessions were for work-related mental health issues, and male users (30%) consulted significantly more often than female users (14%) for such problems. Among men, career development issues were most common, while job dissatisfaction was highest among women. Absenteeism, depression and fatigue were the most frequently observed problems in both sexes. EAP use in Japan is rising. The majority of its use is for non-work-related health issues. Male users were more likely to consult for work-related mental health problems.
Thomas, Michael L.; Green, Michael F.; Hellemann, Gerhard; Sugar, Catherine A.; Tarasenko, Melissa; Calkins, Monica E.; Greenwood, Tiffany A.; Gur, Raquel E.; Gur, Ruben C.; Lazzeroni, Laura C.; Nuechterlein, Keith H.; Radant, Allen D.; Seidman, Larry J.; Shiluk, Alexandra L.; Siever, Larry J.; Silverman, Jeremy M.; Sprock, Joyce; Stone, William S.; Swerdlow, Neal R.; Tsuang, Debby W.; Tsuang, Ming T.; Turetsky, Bruce I.; Braff, David L.; Light, Gregory A.
2017-01-01
Importance Neurophysiological measures of early auditory information processing (EAP) are used as endophenotypes in genomic studies and biomarkers in clinical intervention studies. Research in schizophrenia has established correlations among measures of EAP, cognition, clinical symptoms, and functional outcome. Clarifying these relationships by determining the pathways through which deficits in EAP affect functioning would suggest when and where to therapeutically intervene. Objective We sought to characterize the pathways from EAP to outcome and to estimate the extent to which enhancement of basic information processing might improve both cognition and psychosocial functioning in schizophrenia. Design Cross-sectional data were analyzed using structural equation modeling to examine the associations between EAP, cognition, negative symptoms, and functional outcome. Setting Participants were recruited from the community at five geographically distributed laboratories as part of the Consortium on the Genetics of Schizophrenia-2 (COGS-2). Participants This well-characterized cohort of schizophrenia patients (N = 1,415) underwent EAP and cognitive testing as well as thorough clinical and functional assessment. Main Outcome and Measures EAP was measured by mismatch negativity, P3a, and reorienting negativity. Cognition was measured by the Letter Number Span test and scales from the California Verbal Learning Test - Second Edition, the Wechsler Memory Scale Third Edition, and the Penn Computerized Neurocognitive Battery. Negative symptoms were measured by the Scale for the Assessment of Negative Symptoms. Functional outcome was measured by the Role Functioning Scale. Results EAP had a direct effect on cognition (β = 0.37, p < .001), cognition had a direct effect on negative symptoms (β = −0.16, p < .001), and both cognition (β = 0.26, p < .001) and experiential negative symptoms (β = −0.75, p < .001) had direct effects on functional outcome. Overall, EAP had a fully mediated effect on functional outcome, engaging general rather than modality-specific cognition, with separate pathways that either involved or bypassed negative symptoms. Conclusions and Relevance The data support a model where EAP deficits lead to poor functional outcome via impaired cognition and increased negative symptoms. Results can be used to help guide mechanistically informed, personalized treatments, and support the strategy of using EAP measures as surrogate endpoints in early stage pro-cognitive intervention studies. PMID:27926742
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks
NASA Astrophysics Data System (ADS)
Li, Celia; Wang, Zhuang; Yang, Cungang
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
Optimised to Fail: Card Readers for Online Banking
NASA Astrophysics Data System (ADS)
Drimer, Saar; Murdoch, Steven J.; Anderson, Ross
The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.
Employee Assistance Program Issues
NASA Technical Reports Server (NTRS)
Gettleman, Alan G.; McGuire, William
1999-01-01
Employee Assistance Program (EAP) officers, as well as personnel in other disciplines from eight NASA Centers, attended this breakout session. Ms. Brenda Blair, MA, CEAP, a guest speaker at the conference, also attended as a consultant. Representatives from the NASA Centers introduced themselves and spoke briefly about their programs. In a discussion related to the conference theme on benchmarking, quality control issues within the EAP community and adequate documentation of cases were addressed. Disposition and provision for quality assurance checks for EAP providers in single person offices were also discussed. Ms. Blair presented methods for consulting with other NASA personnel in single person EAP offices as a quality control measure. EAP intervention in critical incidents was discussed. The question of whether EAP assistance is an asset or a potential liability in those situations was addressed. Suggestions were made of topics for future EAP video-teleconference topics. A program on EAP ethics was planned for a September video teleconference. Each person was asked to provide intake forms they use to Mr. Gettleman or Ms. Blair. Ms. Blair said she would review the forms to ensure that adequate notification is provided to the client for confidentiality. She would also review them to ensure they have adequate limits of confidentiality--a topic for future video teleconferencing. Mr. Gettleman described the NASA initiative to reduce stresses in the workplace, and the activities of an ad-hoc EAP group that will make recommendations to NASA senior management. Alternative training methods were discussed for reaching target audiences such as employees at risk, supervisors, and others. Pfc. David A. Pendleton, Victim Assistance Coordinator, U.S. Capitol Police. U.S. House of Representatives made a special presentation. Pfc. Pendleton was on duty during the tragic shooting of two Federal guards at the U.S. Capitol. He related the events immediately after the incident. He described the nature and structure of the EAP's and the separate nature of the House and Senate programs. This episode was a particularly difficult situation as large numbers of tourists were involved. William S. Barry, MD, the new Manager of the NASA Occupational Health Program Office was introduced to those attending the breakout session.
Cell type- and activity-dependent extracellular correlates of intracellular spiking
Perin, Rodrigo; Buzsáki, György; Markram, Henry; Koch, Christof
2015-01-01
Despite decades of extracellular action potential (EAP) recordings monitoring brain activity, the biophysical origin and inherent variability of these signals remain enigmatic. We performed whole cell patch recordings of excitatory and inhibitory neurons in rat somatosensory cortex slice while positioning a silicon probe in their vicinity to concurrently record intra- and extracellular voltages for spike frequencies under 20 Hz. We characterize biophysical events and properties (intracellular spiking, extracellular resistivity, temporal jitter, etc.) related to EAP recordings at the single-neuron level in a layer-specific manner. Notably, EAP amplitude was found to decay as the inverse of distance between the soma and the recording electrode with similar (but not identical) resistivity across layers. Furthermore, we assessed a number of EAP features and their variability with spike activity: amplitude (but not temporal) features varied substantially (∼30–50% compared with mean) and nonmonotonically as a function of spike frequency and spike order. Such EAP variation only partly reflects intracellular somatic spike variability and points to the plethora of processes contributing to the EAP. Also, we show that the shape of the EAP waveform is qualitatively similar to the negative of the temporal derivative to the intracellular somatic voltage, as expected from theory. Finally, we tested to what extent EAPs can impact the lowpass-filtered part of extracellular recordings, the local field potential (LFP), typically associated with synaptic activity. We found that spiking of excitatory neurons can significantly impact the LFP at frequencies as low as 20 Hz. Our results question the common assertion that the LFP acts as proxy for synaptic activity. PMID:25995352
Implementing Diffie-Hellman key exchange using quantum EPR pairs
NASA Astrophysics Data System (ADS)
Mandal, Sayonnha; Parakh, Abhishek
2015-05-01
This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.
NASA Astrophysics Data System (ADS)
Yin, Aihan; Ding, Yisheng
2014-11-01
Identity-related security issues inherently present in passive optical networks (PON) still exist in the current (1G) and next-generation (10G) Ethernet-based passive optical network (EPON) systems. We propose a mutual authentication scheme that integrates an NTRUsign digital signature algorithm with inherent multipoint control protocol (MPCP) frames over an EPON system between the optical line terminal (OLT) and optical network unit (ONU). Here, a primitive NTRUsign algorithm is significantly modified through the use of a new perturbation so that it can be effectively used for simultaneously completing signature and authentication functions on the OLT and the ONU sides. Also, in order to transmit their individual sensitive messages, which include public key, signature, and random value and so forth, to each other, we redefine three unique frames according to MPCP format frame. These generated messages can be added into the frames and delivered to each other, allowing the OLT and the ONU to go ahead with a mutual identity authentication process to verify their legal identities. Our simulation results show that this proposed scheme performs very well in resisting security attacks and has low influence on the registration efficiency to to-be-registered ONUs. A performance comparison with traditional authentication algorithms is also presented. To the best of our knowledge, no detailed design of mutual authentication in EPON can be found in the literature up to now.
Evaluate Your EAP: Can It Help Support Employee Rights Legislation?
ERIC Educational Resources Information Center
Ryan, Katherine C.
1997-01-01
Employee assistance programs (EAPs) are emerging as an efficient way to address employee rights, particularly in light of the Americans with Disabilities Act and the Family and Medical Leave Act. Well-managed EAPs help maintain a healthy, motivated, productive workforce, show effort to provide reasonable accommodation of employee needs, and may…
Fostering Transformative Practitioners for Critical EAP: Possibilities and Challenges
ERIC Educational Resources Information Center
Morgan, Brian
2009-01-01
In this article, I explore the often difficult transfer of theory to practice in respect to promoting the conceptual role of transformative intellectual/practitioner through a pre-service "social issues project" for future EAP and ESL teachers. Following an examination of more established role options in EAP (e.g. technician, reflective…
ERIC Educational Resources Information Center
Alavi, Seyed Mohammad; Borzabadi, Davood; Dashtestani, Reza
2016-01-01
This study aimed to analyze perceptions of Iranian English for Academic Purposes (EAP) students on their computer literacy levels. A total of 641 undergraduate students of civil engineering and 34 EAP instructors participated in the study. Data collection instruments included questionnaires and semi-structured interviews. Findings confirmed that…
EAP: Employee Assistance Programs in the Public Schools. Reference & Resource Series.
ERIC Educational Resources Information Center
Hacker, Carol
Employee assistance programs (EAP's) have been set up by many businesses and organizations to help employees resolve their personal problems so they can maintain or resume an acceptable job performance level. So far, only a few public school districts have considered or implemented such programs. This monograph examines EAP's in general and…
Beliefs on Learning and Teaching Language Components: The Case of Iranian EAP and EFL Learners
ERIC Educational Resources Information Center
Parsi, Gholamreza
2017-01-01
The present study intended to investigate the possible difference between EAP and EFL learners' beliefs concerning learning and teaching of language components, namely, vocabulary, pronunciation and grammar. Furthermore, this study examined the association between EAP and EFL learners' beliefs and their language components' development. To this…
ERIC Educational Resources Information Center
Morris, David S.
2016-01-01
Extracurricular activity participation (EAP) has been positively linked with increased academic achievement and college attendance. However, the mechanisms linking EAP to educational outcomes are poorly understood. Using the Education Longitudinal Study of 2002 (ELS), this study contributes to our understanding of the relationship between EAP and…
A Case for Faculty Involvement in EAP Placement Testing
ERIC Educational Resources Information Center
James, Cindy; Templeman, Elizabeth
2009-01-01
The EAP placement procedure at Thompson Rivers University (TRU) involves multiple measures to assess the language skills of incoming students, some of which are facilitated and all of which are assessed by ESL faculty. In order to determine the effectiveness of this comprehensive EAP placement process and the effect of the faculty factor, a…
Academic Literacies: Providing a Space for the Socio-Political Dynamics of EAP
ERIC Educational Resources Information Center
Turner, Joan
2012-01-01
This article highlights the potential of academic literacies as a theoretical framework for EAP, encompassing not only work on texts, but the wider, socio-political, geopolitical, and institutional contexts and practices in and with which EAP operates. An academic literacies approach foregrounds social practices, and one particular practice, that…
An EAP Program and Students' Success at a Canadian University
ERIC Educational Resources Information Center
Keefe, Karin; Shi, Ling
2017-01-01
Many universities have instituted intensive English for Academic Purposes (EAP) programs to support international students. This qualitative study used interviews to gain insights into the experiences of 8 non-native English speaking (NNES) students who completed an EAP program before they enrolled in disciplinary courses at a Canadian university.…
Exploring Teacher Beliefs in Teaching EAP at Low Proficiency Levels
ERIC Educational Resources Information Center
Alexander, Olwyn
2012-01-01
Teaching English for Academic Purposes (EAP) requires teachers experienced in Communicative Language Teaching (CLT) to acquire additional skills, abilities and approaches. Beliefs about CLT teaching may not be appropriate for teaching EAP, especially to low level learners. Making teachers aware of their beliefs is the first step in helping them to…
Integrating CALL into an Iranian EAP Course: Constraints and Affordances
ERIC Educational Resources Information Center
Mehran, Parisa; Alizadeh, Mehrasa
2015-01-01
Iranian universities have recently displayed a growing interest in integrating Computer-Assisted Language Learning (CALL) into teaching/learning English. The English for Academic Purposes (EAP) context, however, is not keeping pace with the current changes since EAP courses are strictly text-based and exam-oriented, and little research has thus…
Employee assistance programs: a preventive, cost-effective benefit.
Cohen, G S; Gard, L H; Heffernan, W R
1998-01-01
Employee Assistance Programs (EAPs) provide a much-needed service to the employees of corporations. In these times of reduced benefits and diminished community resources, EAPs can dramatically compensate for those shortages. This article will explore the role of an EAP, the models of service available, and the selection process for choosing a program.
ERIC Educational Resources Information Center
Gerstein, Lawrence H.; Bayer, Gregory A.
1991-01-01
Discusses contribution of Bystander-Equity Model of Supervisory Helping Behavior to pursuit of employee assistance program (EAP) research based on traditions of field of counseling. Offers structure for pursuing empirical and applied activities in EAP settings. Encourages counseling researchers and practitioners to respond to challenge of working…
Lee, Ping-Tzu; Dakin, Emily; McLure, Merinda
2016-05-01
Equine-assisted psychotherapy (EAP) is an innovative emerging approach to mental health treatment. This narrative synthesis explores the current state of knowledge and areas for future research in EAP. Specifically reviewed are qualitative and quantitative empirical studies, including both articles published in peer-reviewed journals and research presented in theses and dissertations. We selected 24 studies for final inclusion in this study, dating between 2005 and 2013, and including the first EAP empirical research completed in 2005. Four of these studies are peer-reviewed journal articles, while 20 are master's theses or doctoral dissertations. The reviewed qualitative research provides initial evidence for the value of EAP for enhancing adolescents' communication and relationship skills. The reviewed experimental and quasi-experimental research provides initial evidence for the value of EAP for enhancing children's and adolescents' emotional, social and behavioural functioning. Yet, conclusions about the effectiveness of EAP must still be considered preliminary due to various methodological limitations in the reviewed research. The narrative review describes these methodological limitations and concludes with recommendations for future research. © 2015 John Wiley & Sons Ltd.
Time-dependence of the electromechanical bending actuation observed in ionic-electroactive polymers
NASA Astrophysics Data System (ADS)
Bass, Patrick S.; Zhang, Lin; Cheng, Z.-Y.
The characteristics of the electromechanical response observed in an ionic-electroactive polymer (i-EAP) are represented by the time (t) dependence of its bending actuation (y). The electromechanical response of a typical i-EAP — poly(ethylene oxide) (PEO) doped with lithium perchlorate (LP) — is studied. The shortcomings of all existing models describing the electromechanical response obtained in i-EAPs are discussed. A more reasonable model: y=ymaxe-τ/t is introduced to characterize this time dependence for all i-EAPs. The advantages and correctness of this model are confirmed using results obtained in PEO-LP actuators with different LP contents and at different temperatures. The applicability and universality of this model are validated using the reported results obtained from two different i-EAPs: one is Flemion and the other is polypyrrole actuators.
EMPLOYER CHOICES IN EAP DESIGN AND WORKSITE SERVICES.
McCann, Bernard; Azzone, Vanessa; Merrick, Elizabeth L; Hiatt, Deirdre; Hodgkin, Dominic; Horgan, Constance M
2010-01-01
In today's complex private healthcare market, employers have varied preferences for particular features of behavioral health products such as Employee Assistance Programs (EAPs). Factors which may influence these preferences include: establishment size, type of organization, industry, workplace substance abuse regulations, and structure of health insurance benefits. This study of 103 large employer purchasers from a single managed behavioral healthcare organization investigated the impact of such variables on the EAP features that employers select to provide to workers and their families. Our findings indicate that for this group of employers, preferences for the type and delivery mode of EAP counseling services are fairly universal, while number of sessions provided and choices for EAP-provided worksite activities are much more varied, and may be more reflective of the diverse characteristics, organizational missions and workplace culture found among larger employers in the US.
Review of the Composability Problem for System Evaluation
2004-11-01
burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services ...directory services (e.g., the Lightweight Directory Access Protocol (LDAP)), authentication (e.g., Kerberos), databases, user interface (e.g...exemplifies this type of development, by its use of commercial components and systems for authentication, access management, directory services
Three-party authenticated key agreements for optimal communication
Lee, Tian-Fu; Hwang, Tzonelih
2017-01-01
Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
Nam, Junghyun; Choo, Kim-Kwang Raymond
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956
Flexible Low-Mass Devices and Mechanisms Actuated by Electroactive Polymers
NASA Technical Reports Server (NTRS)
Bar-Cohen, Y; Leary, S.; Shahinpoor, M.; Harrison, J. O.; Smith, J.
1999-01-01
Miniature, lightweight, miser actuators that operate similar to biological muscles can be used to develop robotic devices with unmatched capabilities to impact many technology areas. Electroactive polymers (EAP) offer the potential to producing such actuators and their main attractive feature is their ability to induce relatively large bending or longitudinal strain. Generally, these materials produce a relatively low force and the applications that can be considered at the current state of the art are relatively limited. This reported study is concentrating on the development of effective EAPs and the resultant enabling mechanisms employing their unique characteristics. Several EAP driven mechanisms, which emulate human hand, were developed including a gripper, manipulator arm and surface wiper. The manipulator arm was made of a composite rod with an EAP actuator consisting of a scrolled rope that is activated longitudinally by an electrostatic field. A gripper was made to serve as an end effector and it consisted of multiple bending EAP fingers for grabbing and holding such objects as rocks. An EAP surface wiper was developed to operate like a human finger and to demonstrate the potential to remove dust from optical and IR windows as well as solar cells. These EAP driven devices are taking advantage of the large actuation displacement of these materials but there is need for a significantly greater actuation force capability.
Pillay, Viness; Tsai, Tong-Sheng; Choonara, Yahya E; du Toit, Lisa C; Kumar, Pradeep; Modi, Girish; Naidoo, Dinesh; Tomar, Lomas K; Tyagi, Charu; Ndesendo, Valence M K
2014-06-01
Electroactive polymers (EAPs) are promising candidate materials for the design of drug delivery technologies, especially in conditions where an "on-off" drug release mechanism is required. To achieve this, EAPs such as polyaniline, polypyrrole, polythiophene, ethylene vinyl acetate, and polyethylene may be blended into responsive hydrogels in conjunction with the desired drug to obtain a patient-controlled drug release system. The "on-off" drug release mechanism can be achieved through the environmental-responsive nature of the interpenetrating hydrogel-EAP complex via (i) charged ions initiated diffusion of drug molecules; (ii) conformational changes that occur during redox switching of EAPs; or (iii) electroerosion. These release mechanisms are not exhaustive and new release mechanisms are still under investigation. Therefore, this review seeks to provide a concise incursion and critical overview of EAPs and responsive hydrogels as a strategy for advanced drug delivery, for example, controlled release of neurotransmitters, sulfosalicyclic acid from cross-linked hydrogel, and vaccine delivery. The review further discusses techniques such as linear sweep voltammetry, cyclic voltammetry, impedance spectroscopy, and chronoamperometry for the determination of the redox capability of EAPs. The future implications of the hydrogel-EAP composites include, but not limited to, application toward biosensors, DNA hybridizations, microsurgical tools, and miniature bioreactors and may be utilized to their full potential in the form of injectable devices as nanorobots or nanobiosensors. Copyright © 2013 Wiley Periodicals, Inc.
What Do We Want EAP Teaching Materials for?
ERIC Educational Resources Information Center
Harwood, Nigel
2005-01-01
This paper explores the various anti-textbook arguments in the literature to determine their relevance to the field of EAP. I distinguish between what I call a "strong" and a "weak" anti-textbook line, then review the corpus-based studies which compare the language EAP textbooks teach with corpora of the language academic writers use. After…
The Spatial Politics of Gender in EAP Classroom Practice
ERIC Educational Resources Information Center
Appleby, Roslyn
2009-01-01
This paper explores some of the challenges faced by EAP teachers as they address gender issues that arise when teaching in a non-Western cultural context. It draws on interviews with four Australian teachers regarding their experiences in delivering EAP programs in East Timor as part of an international aid effort, and focuses on critical…
Electromechanically active polymer transducers: research in Europe
NASA Astrophysics Data System (ADS)
Carpi, Federico; Graz, Ingrid; Jager, Edwin; Ladegaard Skov, Anne; Vidal, Frédéric
2013-10-01
Smart materials and structures based on electromechanically active polymers (EAPs) represent a fast growing and stimulating field of research and development. EAPs are materials capable of changing dimensions and/or shape in response to suitable electrical stimuli. They are commonly classified in two major families: ionic EAPs (activated by an electrically induced transport of ions and/or solvent) and electronic EAPs (activated by electrostatic forces). These polymers show interesting properties, such as sizable active strains and/or stresses in response to electrical driving, high mechanical flexibility, low density, structural simplicity, ease of processing and scalability, no acoustic noise and, in most cases, low costs. Since many of these characteristics can also describe natural muscle tissues from an engineering standpoint, it is not surprising that EAP transducers are sometimes also referred to as 'muscle-like smart materials' or 'artificial muscles'. They are used not only to generate motion, but also to sense or harvest energy from it. In particular, EAP electromechanical transducers are studied for applications that can benefit from their 'biomimetic' characteristics, with possible usages from the micro- to the macro-scale, spanning several disciplines, such as mechatronics, robotics, automation, biotechnology and biomedical engineering, haptics, fluidics, optics and acoustics. Currently, the EAP field is just undergoing its initial transition from academic research into commercialization, with companies starting to invest in this technology and the first products appearing on the market. This focus issue is intentionally aimed at gathering contributions from the most influential European groups working in the EAP field. In fact, today Europe hosts the broadest EAP community worldwide. The rapid expansion of the EAP field in Europe, where it historically has strong roots, has stimulated the creation of the 'European Scientific Network for Artificial Muscles—ESNAM', entirely focused on EAPs and gathering the most active research institutes, as well as key industrial developers and end users. The ESNAM network has received financial support from the European COST (Cooperation in Science and Technology) programme (COST Action MP1003), leading to fruitful collaboration, of which some results are showcased in this issue. This focus issue deals with a number of relevant topics on ionic and electronic EAPs. The contents, which span highly heterogeneous and cross diverse disciplines, such as physics, chemistry, material science and engineering, embrace size scales from nano to macro, and cover different areas, such as new materials, devices and applications. This collection of papers helps elucidate, on the one hand, how heterogeneous and dynamic the EAP field is in general and, on the other hand, the state of the art of the EAP research in Europe. We hope that this focus issue might help to stimulate future work in this emerging field of research and generate new applications. Acknowledgments We would like to thank all the authors for their contributions, and the Smart Materials and Structures Editor-in-Chief, Professor Garcia, for having accepted our proposal to organize this focus issue. Special thanks also go to Natasha Leeper, from the IOP Publishing team, for her continued support and impeccable professionalism in arranging this focus issue. We also gratefully acknowledge financial support from COST (European Cooperation in Science and Technology) in the framework of 'ESNAM—European Scientific Network for Artificial Muscles' (COST Action MP1003), which made possible cooperation that led to contributions to this issue.
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology
Winata, Doni
2018-01-01
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol. PMID:29587399
Cryptographic framework for document-objects resulting from multiparty collaborative transactions.
Goh, A
2000-01-01
Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
Yohan, Alexander; Lo, Nai-Wei; Winata, Doni
2018-03-25
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
Thomas, Michael L; Green, Michael F; Hellemann, Gerhard; Sugar, Catherine A; Tarasenko, Melissa; Calkins, Monica E; Greenwood, Tiffany A; Gur, Raquel E; Gur, Ruben C; Lazzeroni, Laura C; Nuechterlein, Keith H; Radant, Allen D; Seidman, Larry J; Shiluk, Alexandra L; Siever, Larry J; Silverman, Jeremy M; Sprock, Joyce; Stone, William S; Swerdlow, Neal R; Tsuang, Debby W; Tsuang, Ming T; Turetsky, Bruce I; Braff, David L; Light, Gregory A
2017-01-01
Neurophysiologic measures of early auditory information processing (EAP) are used as endophenotypes in genomic studies and biomarkers in clinical intervention studies. Research in schizophrenia has established correlations among measures of EAP, cognition, clinical symptoms, and functional outcome. Clarifying these associations by determining the pathways through which deficits in EAP affect functioning would suggest when and where to therapeutically intervene. To characterize the pathways from EAP to outcome and to estimate the extent to which enhancement of basic information processing might improve cognition and psychosocial functioning in schizophrenia. Cross-sectional data were analyzed using structural equation modeling to examine the associations among EAP, cognition, negative symptoms, and functional outcome. Participants were recruited from the community at 5 geographically distributed laboratories as part of the Consortium on the Genetics of Schizophrenia 2 from July 1, 2010, through January 31, 2014. This well-characterized cohort of 1415 patients with schizophrenia underwent EAP, cognitive, and thorough clinical and functional assessment. Mismatch negativity, P3a, and reorienting negativity were used to measure EAP. Cognition was measured by the Letter Number Span test and scales from the California Verbal Learning Test-Second Edition, the Wechsler Memory Scale-Third Edition, and the Penn Computerized Neurocognitive Battery. Negative symptoms were measured by the Scale for the Assessment of Negative Symptoms. Functional outcome was measured by the Role Functioning Scale. Participants included 1415 unrelated outpatients diagnosed with schizophrenia or schizoaffective disorder (mean [SD] age, 46 [11] years; 979 males [69.2%] and 619 white [43.7%]). Early auditory information processing had a direct effect on cognition (β = 0.37, P < .001), cognition had a direct effect on negative symptoms (β = -0.16, P < .001), and both cognition (β = 0.26, P < .001) and experiential negative symptoms (β = -0.75, P < .001) had direct effects on functional outcome. The indirect effect of EAP on functional outcome was significant as well (β = 0.14, P < .001). Overall, EAP had a fully mediated effect on functional outcome, engaging general rather than modality-specific cognition, with separate pathways that involved or bypassed negative symptoms. The data support a model in which EAP deficits lead to poor functional outcome via impaired cognition and increased negative symptoms. Results can be used to help guide mechanistically informed, personalized treatments and support the strategy of using EAP measures as surrogate end points in early-stage procognitive intervention studies.
Cho, Hyung-Rae; Park, Dong-Chan; Jung, Go-Woon
2018-01-01
The present study assessed the beneficial skeletal muscle-preserving effects of extracellular polysaccharides from Aureobasidium pullulans SM-2001 (Polycan) (EAP) on dexamethasone (DEXA)-induced catabolic muscle atrophy in mice. To investigate whether EAP prevented catabolic DEXA-induced muscle atrophy, and to examine its mechanisms of action, EAP (100, 200 and 400 mg/kg) was administered orally, once a day for 24 days. EAP treatment was initiated 2 weeks prior to DEXA treatment (1 mg/kg, once a day for 10 days) in mice. Body weight alterations, serum biochemistry, calf thickness, calf muscle strength, gastrocnemius muscle thickness and weight, gastrocnemius muscle antioxidant defense parameters, gastrocnemius muscle mRNA expression, histology and histomorphometry were subsequently assessed. After 24 days, DEXA control mice exhibited muscle atrophy according to all criteria indices. However, these muscle atrophy symptoms were significantly inhibited by oral treatment with all three doses of EAP. Regarding possible mechanisms of action, EAP exhibited favorable ameliorating effects on DEXA-induced catabolic muscle atrophy via antioxidant and anti-inflammatory effects; these effects were mediated by modulation of the expression of genes involved in muscle protein synthesis (AKT serine/threonine kinase 1, phosphatidylinositol 3-kinase, adenosine A1 receptor and transient receptor potential cation channel subfamily V member 4) and degradation (atrogin-1, muscle RING-finger protein-1, myostatin and sirtuin 1). Therefore, these results indicated that EAP may be helpful in improving muscle atrophies of various etiologies. EAP at 400 mg/kg exhibited favorable muscle protective effects against DEXA-induced catabolic muscle atrophy, comparable with the effects of oxymetholone (50 mg/kg), which has been used to treat various muscle disorders. PMID:29138805
An analysis of the contrasting fates of locust swarms on the plains of North America and East Asia
NASA Astrophysics Data System (ADS)
Yu, G.; Ke, X.; Shen, H. D.; Li, Y. F.
2013-03-01
Prior to ~1880 AD locust swarms periodically raged across both the North American Plains (NAP) and East Asian Plains (EAP). After this date, locust outbreaks almost never recurred on the NAP but have continued to cause problems on the EAP. The large quantities of pesticides used in the major agriculture regions of the NAP in the late 1870s have been suggested as a possible reason for the disappearance of locust outbreaks in this area. Extensive applications of modern, i.e. more effective, chemical pesticides were also used in the granary regions of the EAP in the 1950s in an effort to reduce pest outbreaks. However, locust swarms returned again in many areas of China in the 1960s. Therefore, locust extinction on the NAP still remains a puzzle. Frequent locust outbreaks on the EAP over the past 130 yr may offer clues to the key factors that control the disappearance of locust outbreaks on the NAP. This study analysed the climate extremes and monthly temperature-precipitation combinations for the NAP and EAP, and found that differences in the frequencies of these climate combinations resulted in the contrasting locust fates in the two regions: restricting locust outbreaks in the NAP but inducing such events in the EAP. Validation shows that severe EAP locust outbreak years were coincidental with extreme climate-combination years. Therefore, we suggest that changes in frequency, extremes and trends in climate can explain why the fate of locust outbreaks in the EAP was different from that in the NAP. The results also suggest that, with present global warming trends, precautionary measures should be taken to make sure other similar pest infestations do not occur in either region.
A~probe into the different fates of locust swarms in the plains of North America and East Asia
NASA Astrophysics Data System (ADS)
Yu, G.; Johnson, D.; Ke, X.; Li, Y.
2012-08-01
Locust swarms had periodically raged in both North American Plains (NAP) and East Asian Plains (EAP) before 1880 AD. After this period, the locust outbreaks almost never recurred in NAP but have continued to occur in EAP. Since large quantities of pesticides were used in the major agriculture regions of NAP in the late 1870s; this has been suggested as a possible major cause of the disappearing of locust outbreaks. Extensive applications of more effective chemical pesticides were also used in the granary regions of EAP in the 1950s in an effort to kill the pests at a much higher intensity. However, locust swarms came back again in many areas of China in the 1960s. Therefore, NAP locust extinction still remains a puzzle. Frequent locust outbreaks in EAP over the past 130 yr may offer clues to probe key control elements in the disappearing of locust outbreaks in NAP. This paper analyzes the climate extremes and monthly temperature-precipitation combines of NAP and EAP, and found the differences in their frequencies of these climate combines caused different locust fates in the two regions: restrained the locust outbreak in NAP but induced such events in EAP. Validation shows that severer EAP locust outbreak years were coincided with the climate extreme combines years. Thus we suggest that climate changes in frequency, extremes and trends can explain why the fate of the locust plague in EAP was different from that in NAP. The study also points out that, under the present global warming, cautions should be taken to make sure the pest hazard being nipped in the-bud.
Popov, I P; Jelić, S B; Krivokapić, Z V; Jezdić, S D; Pesko, P M; Micev, M T; Babić, D R
2008-01-01
To investigate the activity and toxicity of high dose (HD) infusional 5-FU in comparison to EAP regimen as first-line chemotherapy in patients with advanced gastric cancer. Histologically confirmed measurable advanced gastric cancer, age < 72 yr, ECOG performance status 0-2, no prior chemo- and radiotherapy, adequate organ functions. EAP arm: doxorubicin (40 mg/m(2)), etoposide (360 mg/m(2)), and cisplatin (80 mg/m(2)) every 28 d; HD 5-FU arm: 5-FU 2.6 g/m(2) 24 h infusion, biweekly. Sixty patients were randomized. Patient characteristics (arms EAP/HD 5-FU): Median age 57/55 yr, median PS 1/1, LAD (patients) 3/8, M1 (patients) 27/22. Median number of cycles (range): EAP arm 4 (2-8), HD 5-FU arm 2 (1-8). Worst toxicity per cycle (grade 3 and 4 in%): Neutropenia 20/3, thrombocytopenia 9/0, anemia 9/13, diarrhea 3/10, nausea 17/7, vomiting 10/0 for EAP and HD 5-FU arms, respectively. All patients were eligible for response in both arms. Confirmed response rate (95%CI): EAP arm 34% [16-50%]/HD 5-FU arm 10% (0-21%), no change: 46/40%, progression of disease: 20/50, respectively. Overall survival (range): EAP arm A 7 mo [3-27], HD 5-FU arm 6 mo (4-25). Infusional HD 5-FU showed a low incidence of severe toxicity. But given the low efficacy of 5-FU in the dosage we applied in the study, it cannot be recommended as a single treatment for further studies. Assessment of higher dose intensity and/or dose density of 5-FU, with introduction of other active drugs in combination, could be an option for further studies.
Garcia, Brandon L.; Ramyar, Kasra X.; Keightley, Andrew; Ruyken, Maartje; Syriga, Maria; Sfyroera, Georgia; Weber, Alexander B.; Zolkiewski, Michal; Ricklin, Daniel; Lambris, John D.; Rooijakkers, Suzan H.M.; Geisbrecht, Brian V.
2014-01-01
The pathogenic bacterium Staphylococcus aureus actively evades many aspects of human innate immunity by expressing a series of small inhibitory proteins. A number of these proteins inhibit the complement system, which labels bacteria for phagocytosis and generates inflammatory chemoattractants. While the majority of staphylococcal complement inhibitors act on the alternative pathway (AP) to block the amplification loop, only a few proteins act on the initial recognition cascades that constitute the classical (CP) and lectin (LP) pathways. We screened a collection of recombinant, secreted staphylococcal proteins to determine if S. aureus produces other molecules that inhibit either the CP and/or LP. Using this approach, we identified the extracellular adherence protein (Eap) as a potent, specific inhibitor of both the CP and LP. We found that Eap blocked CP/LP-dependent activation of C3, but not C4, and that Eap likewise inhibited deposition of C3b on the surface of S. aureus cells. In turn, this significantly diminished the extent of S. aureus opsonophagocytosis and killing by neutrophils. This combination of functional properties suggested that Eap acts specifically at the level of the CP/LP C3 convertase (C4b2a). Indeed, we demonstrated a direct, nanomolar-affinity interaction of Eap with C4b. Eap binding to C4b inhibited binding of both full-length C2 and its C2b fragment, which indicated that Eap disrupts formation of the CP/LP C3 pro-convertase (C4b2). As a whole, our results demonstrate that S. aureus inhibits the two initiation routes of complement by expression of the Eap protein, and thereby define a novel mechanism of immune evasion. PMID:25381436
Silva, Jucélia Barbosa da; Mendes, Renata de Freitas; Tomasco, Vívian; Pinto, Nícolas de Castro Campos; de Oliveira, Luiz Gustavo; Rodrigues, Matheus Nehrer; Aragão, Danielle Maria de Oliveira; Aguiar, Jair Adriano Kopke de; Alves, Maria Silvana; Castañon, Maria Christina Nogueira Marques; Ribeiro, Antônia; Scio, Elita
2017-02-23
Vernonia condensata Baker (Asteraceae) is traditionally used in South American Countries as an anti-inflammatory, analgesic and hepatoprotective. This study aimed to investigate the in vivo hepatoprotective and antioxidant, and the in vitro anti-inflammatory activities of the ethyl acetate partition (EAP) from the ethanolic extract of this medicinal plant leaves. For the in vivo hepatoprotective activity, rats were pretreated orally for seven days with vehicle, silymarin 100mg/kg or EAP 50, 100 and 200mg/kg. Then, acetaminophen 3g/kg was also orally administrated. Animals were euthanatized 24h after the damage inducement. The levels of the serum enzymes ALT, AST and ALP were determined, as well as the triglycerides, total cholesterol and fractions. The antioxidant activity was evaluated by TBARS assay and by the measurement of glutathione reductase, superoxide dismutase and catalase activities in the rats liver tissue. The in vitro anti-inflammatory assay using Raw 264.7 cell line induced by lipopolysaccharide was conducted to verify EAP ability to inhibit pro-inflammatory cytokines. EAP was able to inhibit all the acute biochemical alterations caused by acetaminophen overdose. EAP inhibited malondialdehyde formation, maintained the catalase and increased the glutathione reductase activities. Also, EAP decreased NO, IL-6 and TNF-α levels at concentrations from 10 to 20µg/mL. 1,5-dicaffeoylquinic acid was isolated and identified as the major compound in EAP. Apigenin, luteolin, chlorogenic acid were also identified. EAP anti-inflammatory action may be due to its antioxidant activity or its capacity to inhibit the pro-inflammatory cytokines. These results strongly suggested that V. condensata may be useful as a possible therapy against liver damage. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.
Electroactive polymers for sensing
2016-01-01
Electromechanical coupling in electroactive polymers (EAPs) has been widely applied for actuation and is also being increasingly investigated for sensing chemical and mechanical stimuli. EAPs are a unique class of materials, with low-moduli high-strain capabilities and the ability to conform to surfaces of different shapes. These features make them attractive for applications such as wearable sensors and interfacing with soft tissues. Here, we review the major types of EAPs and their sensing mechanisms. These are divided into two classes depending on the main type of charge carrier: ionic EAPs (such as conducting polymers and ionic polymer–metal composites) and electronic EAPs (such as dielectric elastomers, liquid-crystal polymers and piezoelectric polymers). This review is intended to serve as an introduction to the mechanisms of these materials and as a first step in material selection for both researchers and designers of flexible/bendable devices, biocompatible sensors or even robotic tactile sensing units. PMID:27499846
Research Trends of Soft Actuators based on Electroactive Polymers and Conducting Polymers
NASA Astrophysics Data System (ADS)
Kaneto, K.
2016-04-01
Artificial muscles (or soft actuators) based on electroactive polymers (EAPs) are attractive power sources to drive human-like robots in place of electrical motor, because they are quiet, powerful, light weight and compact. Among EAPs for soft actuators, conducting polymers are superior in strain, stress, deformation form and driving voltage compared with the other EAPs. In this paper, the research trends of EAPs and conducting polymers are reviewed by retrieval of the papers and patents. The research activity of EAP actuators showed the maximum around 2010 and somehow declining now days. The reasons for the reducing activity are found to be partly due to problems of conducting polymer actuators for the practical application. The unique characteristics of conducting polymer actuators are mentioned in terms of the basic mechanisms of actuation, creeping, training effect and shape retention under high tensile loads. The issues and limitation of conducting polymer soft actuators are discussed.
The Effect of Employee Assistance Plan Benefits on the Use of Outpatient Behavioral Health Care
Hodgkin, Dominic; Merrick, Elizabeth L.; Hiatt, Deirdre; Horgan, Constance M.; McGuire, Thomas G.
2011-01-01
Many US workers have access both to an employee assistance plan (EAP) and to employer health insurance that includes behavioral health services. We examine whether EAP services substitute for outpatient behavioral health care services covered by the health plan, in settings where the employer has purchased both products jointly. We analyze administrative data for 26,464 patients enrolled with a managed behavioral health organization in 2005. General linear models are used to predict visits and spending for regular outpatient care. We also use instrumental variable analysis to test for endogeneity of the number of EAP visits covered. Having more generous EAP coverage predicts fewer regular outpatient visits, and lower spending for outpatient care. This supports the idea that the two types of care are to some extent perceived as substitutes, although patients also appear to perceive that EAP services offer something distinct from regular outpatient care. PMID:21368341
Van Campen, Luann E.; Garnett, Timothy
2015-01-01
Expanded access is a regulatory mechanism by which an investigational drug can be made available outside of a clinical trial to treat patients with serious or life-threatening conditions for which there are no satisfactory treatment options. An expanded access program (EAP) is the formal plan under which preapproval access to an investigational drug can be provided to a group of patients. Although an EAP is a regulated program, the decision to authorize an EAP is the responsibility of the biopharmaceutical sponsor. Because of the significant impact an EAP can have on current patients, drug development, and future patients, we propose that a sponsor’s decision must be based not only on regulatory criteria but also on ethical and practical considerations regarding implementation of an EAP. Such an approach will help ensure that decisions and plans uphold ethical precepts such as fairness, promoting good, and minimizing risk of harm. PMID:29473010
Chan, Karen K; Neighbors, Clayton; Marlatt, G Alan
2004-12-01
Employee assistance programs (EAPs) are widely available to assist employees with a variety of problems. This research examined factors related to utilization and outcome by individuals with addictive behaviors (ABs) versus other problem areas. The specific aims of this study were to evaluate referral source and treatment outcome by gender and presenting problem. The sample included 3890 men and women who attended the EAP for a variety of concerns. Men were less likely than women to self-refer and more likely to be mandated to the EAP. Men were also much more likely to present with ABs. Relative to clients presenting with other issues, individuals with ABs were less likely to self-refer, have their problems resolved in the EAP, and were seen for fewer sessions. These results suggest that EAPs may be well suited for implementation of brief interventions (BIs) that have been empirically supported in other contexts.
EMPLOYER CHOICES IN EAP DESIGN AND WORKSITE SERVICES
McCann, Bernard; Azzone, Vanessa; Merrick, Elizabeth L.; Hiatt, Deirdre; Hodgkin, Dominic; Horgan, Constance M.
2011-01-01
SUMMARY In today’s complex private healthcare market, employers have varied preferences for particular features of behavioral health products such as Employee Assistance Programs (EAPs). Factors which may influence these preferences include: establishment size, type of organization, industry, workplace substance abuse regulations, and structure of health insurance benefits. This study of 103 large employer purchasers from a single managed behavioral healthcare organization investigated the impact of such variables on the EAP features that employers select to provide to workers and their families. Our findings indicate that for this group of employers, preferences for the type and delivery mode of EAP counseling services are fairly universal, while number of sessions provided and choices for EAP-provided worksite activities are much more varied, and may be more reflective of the diverse characteristics, organizational missions and workplace culture found among larger employers in the US. PMID:22768017
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
A Mutual Authentication Framework for Wireless Medical Sensor Networks.
Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav
2017-05-01
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.
ERIC Educational Resources Information Center
Thoreson, Richard W., Ed.; Hosokawa, Elizabeth P., Ed.
The promotion of employee assistance programs (EAP) in higher education is considered in 24 chapters, with an emphasis on enhancing resources and the academic environment for faculty and staff. Seven topical areas are addressed: history of EAP; characteristics of higher education; alcoholism and other risks in the academic life-style; EAP models…
Examining the Use of Web-Based Tests for Testing Academic Vocabulary in EAP Instruction
ERIC Educational Resources Information Center
Dashtestani, Reza
2015-01-01
Interest in Web-based and computer-assisted language testing is growing in the field of English for academic purposes (EAP). In this study, four groups of undergraduate EAP students (n = 120), each group consisted of 30 students, were randomly selected from four different disciplines, i.e. biology, political sciences, psychology, and law. The four…
Employee assistance programs: history and program description.
Gilbert, B
1994-10-01
1. The history and development of Employee Assistance Programs (EAPs) can be traced back to the 1800s. There are currently over 10,000 EAPs in the United States. 2. Standards for program accreditation and counselor certification have been established for EAPs. The "core technology of Employee Assistance Programs" includes identification of behavioural problems based on job performance issues, expert consultation with supervisors, appropriate use of constructive confrontation, microlinkages with treatment providers and resources, macrolinkages between providers, resources, and work organizations, focus on substance abuse, and evaluation of employee success based on job performance. 3. Some EAPs take a broad brush approach, and incorporate health promotion and managed care functions.
Fast and Analytical EAP Approximation from a 4th-Order Tensor.
Ghosh, Aurobrata; Deriche, Rachid
2012-01-01
Generalized diffusion tensor imaging (GDTI) was developed to model complex apparent diffusivity coefficient (ADC) using higher-order tensors (HOTs) and to overcome the inherent single-peak shortcoming of DTI. However, the geometry of a complex ADC profile does not correspond to the underlying structure of fibers. This tissue geometry can be inferred from the shape of the ensemble average propagator (EAP). Though interesting methods for estimating a positive ADC using 4th-order diffusion tensors were developed, GDTI in general was overtaken by other approaches, for example, the orientation distribution function (ODF), since it is considerably difficult to recuperate the EAP from a HOT model of the ADC in GDTI. In this paper, we present a novel closed-form approximation of the EAP using Hermite polynomials from a modified HOT model of the original GDTI-ADC. Since the solution is analytical, it is fast, differentiable, and the approximation converges well to the true EAP. This method also makes the effort of computing a positive ADC worthwhile, since now both the ADC and the EAP can be used and have closed forms. We demonstrate our approach with 4th-order tensors on synthetic data and in vivo human data.
Fast and Analytical EAP Approximation from a 4th-Order Tensor
Ghosh, Aurobrata; Deriche, Rachid
2012-01-01
Generalized diffusion tensor imaging (GDTI) was developed to model complex apparent diffusivity coefficient (ADC) using higher-order tensors (HOTs) and to overcome the inherent single-peak shortcoming of DTI. However, the geometry of a complex ADC profile does not correspond to the underlying structure of fibers. This tissue geometry can be inferred from the shape of the ensemble average propagator (EAP). Though interesting methods for estimating a positive ADC using 4th-order diffusion tensors were developed, GDTI in general was overtaken by other approaches, for example, the orientation distribution function (ODF), since it is considerably difficult to recuperate the EAP from a HOT model of the ADC in GDTI. In this paper, we present a novel closed-form approximation of the EAP using Hermite polynomials from a modified HOT model of the original GDTI-ADC. Since the solution is analytical, it is fast, differentiable, and the approximation converges well to the true EAP. This method also makes the effort of computing a positive ADC worthwhile, since now both the ADC and the EAP can be used and have closed forms. We demonstrate our approach with 4th-order tensors on synthetic data and in vivo human data. PMID:23365552
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication
NASA Astrophysics Data System (ADS)
Murdoch, Steven J.; Anderson, Ross
Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.
Preventing Sudden Cardiac Death: Automated External Defibrillators in Ohio High Schools.
Lear, Aaron; Hoang, Minh-Ha; Zyzanski, Stephen J
2015-10-01
Ohio passed legislation in 2004 for optional public funding of automated external defibrillators (AEDs) in all Ohio high schools. To report occurrences of sudden cardiac arrest in which AEDs were used in Ohio high schools and to evaluate the adherence of Ohio high schools with AEDs to state law and published guidelines on AEDs and emergency action plans (EAPs) in schools. Cross-sectional survey. Web-based survey. A total of 264 of 827 schools that were members of the Ohio High School Athletic Association. We surveyed schools on AED use, AED maintenance, and EAPs. Twenty-five episodes of AED deployment at 22 schools over an 11-year period were reported; 8 (32%) involved students and 17 (68%) involved adults. The reported survival rate was 60% (n = 15). Most events (n = 20, 80%) in both students and adults occurred at or near athletic facilities. The annual use rate of AEDs was 0.7%. Fifty-three percent (n = 140) of schools reported having an EAP in place for episodes of cardiac arrest. Of the schools with EAPs, 57% (n = 80) reported having rehearsed them. Our data supported the placement of AEDs in high schools given the frequency of use for sudden cardiac arrest and the survival rate reported. They also suggested the need for increased awareness of recommendations for EAPs and the need to formulate and practice EAPs. School EAPs should emphasize planning for events in the vicinity of athletic facilities.
Herrera, Alvaro I; Ploscariu, Nicoleta T; Geisbrecht, Brian V; Prakash, Om
2018-04-01
Staphylococcus aureus is a widespread and persistent pathogen of humans and livestock. The bacterium expresses a wide variety of virulence proteins, many of which serve to disrupt the host's innate immune system from recognizing and clearing bacteria with optimal efficiency. The extracellular adherence protein (Eap) is a multidomain protein that participates in various protein-protein interactions that inhibit the innate immune response, including both the complement system (Woehl et al in J Immunol 193:6161-6171, 2014) and Neutrophil Serine Proteases (NSPs) (Stapels et al in Proc Natl Acad Sci USA 111:13187-13192, 2014). The third domain of Eap, Eap3, is an ~ 11 kDa protein that was recently shown to bind complement component C4b (Woehl et al in Protein Sci 26:1595-1608, 2017) and therefore play an essential role in inhibiting the classical and lectin pathways of complement (Woehl et al in J Immunol 193:6161-6171, 2014). Since structural characterization of Eap3 is still incomplete, we acquired a series of 2D and 3D NMR spectra of Eap3 in solution. Here we report the backbone and side-chain 1 H, 15 N, and 13 C resonance assignments of Eap3 and its predicted secondary structure via the TALOS-N server. The assignment data have been deposited in the BMRB data bank under accession number 27087.
Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)
2006-12-01
Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a
ERIC Educational Resources Information Center
Arno-Macia, Elisabet; Rueda-Ramos, Carmen
2011-01-01
With the new European framework, as EAP lecturers in an engineering college, we are reappraising our teaching and the position of our courses. From the perspective of engineering education in the 21st century, we believe that EAP teaching can focus not only on language and communication needs, but also on developing critical thinking about science…
ESCRT-II's involvement in HIV-1 genomic RNA trafficking and assembly.
Ghoujal, Bashar; Milev, Miroslav P; Ajamian, Lara; Abel, Karen; Mouland, Andrew J
2012-12-01
Several host proteins play crucial roles in the HIV-1 replication cycle. The endosomal sorting complex required for transport (ESCRT) exemplifies a large, multi-component host machinery that is required by HIV-1 for viral budding. ESCRT promotes the inward budding of vesicles from the membranes of late endosomes to generate multi-vesicular bodies. However, HIV-1 co-opts the ESCRT to enable outwards budding of virus particles from the plasma membrane, a phenomenon that is topologically similar to multi-vesicular body biogenesis. A role for ESCRTII in mRNA trafficking has been established in Drosophila in which the ESCRT-II components, Vps22 and Vps36, promote the localisation of the bicoid mRNA in the fertilised egg. This is achieved via specific interactions with the Staufen protein. In this work, we investigated a possible implication of ESCRT-II in the HIV-1 replication cycle. Co-immunoprecipitation analyses and live cell tri-molecular fluorescence complementation assays revealed that interactions between EAP30 and Gag and another between EAP30 and Staufen1 occur in mammalian cells. We then depleted EAP30 (the orthologue for Vps22) by siRNA to target ESCRT-II in HIV-1 expressing cells. This treatment disrupted ESCRT-II function and leads to the degradation of the two other ESCRT-II complex proteins, EAP45 and EAP20, as well as the associated Rab7-interacting lysosomal protein. The depletion of EAP30 led to dramatically reduced viral structural protein Gag and virus production levels, without any effect on viral RNA levels. On the contrary, the overexpression of EAP30 led to a several-fold increase in virus production. Unexpec-tedly, siRNA-mediated depletion of EAP30 led to a block to HIV-1 genomic RNA trafficking and resulted in the accumulation of genomic RNA in the nucleus and juxtanuclear domains. Our data provide the first evidence that the Staufen1-ESCRT-II interaction is evolutionarily conserved from lower to higher eukaryotes and reveal a novel role for EAP30 in the control of HIV-1 RNA trafficking and gene expression. Copyright © 2012 Wiley-Liss, Inc.
NASA Astrophysics Data System (ADS)
Cakmak, Enes
Conventional means of converting electrical energy to mechanical work are generally considered too noisy and bulky for many contemporary technologies such as microrobotic, microfluidic, and haptic devices. Dielectric electroactive polymers (D-EAPs) constitude a growing class of electroactive polymers (EAP) that are capable of producing mechanica work induced by an applied electric field. D-EAPs are considered remarkably efficient and well suited for a wide range of applications, including ocean-wave energy harvesters and prosthetic devices. However, the real-world application of D-EAPs is very limited due to a number of factors, one of which is the difficulty of producing high actuation strains at acceptably low electric fields. D-EAPs are elastomeric polymers and produce large strain response induced by external electric field. The electromechanical properties of D-EAPs depend on the dielectric properties and mechanical properties of the D-EAP. In terms of dielectric behavior, these actuators require a high dielectric constant, low dielectric loss, and high dielectric strength to produce an improved actuation response. In addition to their dielectric properties, the mechanical properties of D-EAPs, such as elastic moduli and hysteresis, are also of importance. Therefore, material properties are a key feature of D-EAP technology. DE actuator materials reported in the literature cover many types of elastomers and their composites formed with dielectric fillers. Along with polymeric matrix materials, various ceramic, metal, and organic fillers have been employed in enhancing dielectric behavior of DEs. This work describes an effort to characterize elastomer blends and composites of different matrix and dielectric polymer fillers according to their dielectric, mechanical, and electromechanical responses. This dissertation focuses on the development and characterization of polymer-polymer blends and composites from a high-k polyurethane (PU) and polydimethylsiloxane (PDMS) elastomers. Two different routes were followed with respect to elastomer processing: The first is a simple solution blending of the two types of elastomers, and the second is based on preparation of composites from PU nanofiber webs and PDMS elastomer. Both the blends and the nanofiber web composites showed improved dielectric and actuation characteristics.
Progress toward EAP actuators for biomimetic social robots
NASA Astrophysics Data System (ADS)
Hanson, D.
2013-04-01
Social robotics and artificial intelligence have progressed steadily in recent years, appearing in a variety of useful applications and products as well as breakthrough research. However, limitations in conventional motors continue to limit the possibilities of bio-inspired robotics. Such motors are needed for locomotion, grasping and manipulation, and social expressions and gestures. EAP actuators, being more like biological muscle in key regards, could revolutionize the hardware for such robots, if made robust, powerful, and manufacturable at reasonable prices. The author presents a survey of the progress and opportunities for EAP actuators in these fields, and discusses the latest work of his team in developing and manufacturing social robots that could benefit from EAP actuators.
Health promotion through employee assistance programs: a role for occupational therapists.
Maynard, M
1986-11-01
Health promotion is predicted to have a major impact on occupational therapy practice. Keeping people well and promoting a healthy life-style will be the focus for the future. Many companies and agencies are taking the lead by instituting employee assistance programs (EAPs). With the de-emphasis on long-term hospital care, many occupational therapists will be seeking employment with community health programs. This paper advocates a role for occupational therapists in health promotion and disease prevention in an EAP. A description of EAPs and the contributions that occupational therapists can make to these programs is offered. Practice and education considerations for occupational therapists' roles in EAPs are provided.
Foote, A; Googins, B; Moriarty, M; Sandonato, C; Nadolski, J; Jefferson, C
1994-12-01
This paper reports on a study in progress which involves (a) regular post-treatment contact by employee assistance program (EAP) staff with employees who seek help through the EAP, and (b) contact with a family member or other support person designated by the employee. The contacts are designed to provide support for maintenance of therapeutic gains, assistance in adjusting to current life situations, and early identification and prevention of relapse. The study will evaluate the process of initiating these contacts and will examine their effectiveness at reducing relapse. Factors associated with implementing these services in an EAP context are discussed.
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
NASA Astrophysics Data System (ADS)
Desmedt, Yvo; Lange, Tanja; Burmester, Mike
Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.
Fang, Wanping; Meinhardt, Lyndel W; Mischke, Sue; Bellato, Cláudia M; Motilal, Lambert; Zhang, Dapeng
2014-01-15
Cacao (Theobroma cacao L.), the source of cocoa, is an economically important tropical crop. One problem with the premium cacao market is contamination with off-types adulterating raw premium material. Accurate determination of the genetic identity of single cacao beans is essential for ensuring cocoa authentication. Using nanofluidic single nucleotide polymorphism (SNP) genotyping with 48 SNP markers, we generated SNP fingerprints for small quantities of DNA extracted from the seed coat of single cacao beans. On the basis of the SNP profiles, we identified an assumed adulterant variety, which was unambiguously distinguished from the authentic beans by multilocus matching. Assignment tests based on both Bayesian clustering analysis and allele frequency clearly separated all 30 authentic samples from the non-authentic samples. Distance-based principle coordinate analysis further supported these results. The nanofluidic SNP protocol, together with forensic statistical tools, is sufficiently robust to establish authentication and to verify gourmet cacao varieties. This method shows significant potential for practical application.
Wirelessly Controllable Inflated Electroactive Polymer (EAP) Reflectors
NASA Technical Reports Server (NTRS)
Bao, Xiaoqi; Bar-Cohen, Yoseph; Chang, Zensheu; Sherrit, Stewart; Badescu, Mircea
2005-01-01
Inflatable membrane reflectors are attractive for deployable, large aperture, lightweight optical and microwave systems in micro-gravity space environment. However, any fabrication flaw or temperature variation may results in significant aberration of the surface. Even for a perfectly fabricated inflatable membrane mirror with uniform thickness, theory shows it will form a Hencky curve surface but a desired parabolic or spherical surface. Precision control of the surfaceshape of extremely flexible membrane structures is a critical challenge for the success of this technology. Wirelessly controllable inflated reflectors made of electroactive polymers (EAP) are proposed in this paper. A finite element model was configured to predict the behavior of the inflatable EAP membranes under pre-strains, pressures and distributed electric charges on the surface. To explore the controllability of the inflatable EAP reflectors, an iteration algorism was developed to find the required electric actuation for correcting the aberration of the Hencky curve to the desired parabolic curve. The correction capability of the reflectors with available EAP materials was explored numerically and is presented in this paper.
Employee assistance programs, drug testing, and workplace injury.
Waehrer, Geetha M; Miller, Ted R; Hendrie, Delia; Galvin, Deborah M
2016-06-01
Little is known about the effects of employee assistance programs (EAPs) on occupational injuries. Multivariate regressions probed a unique data set that linked establishment information about workplace anti-drug programs in 1988 with occupational injury rates for 1405 establishments. EAPs were associated with a significant reduction in both no-lost-work and lost-work injuries, especially in the manufacturing and transportation, communication and public utilities industries (TCPU). Lost-work injuries were more responsive to specific EAP characteristics, with lower rates associated with EAPs staffed by company employees (most likely onsite). Telephone hotline services were associated with reduced rates of lost-work injuries in manufacturing and TCPU. Drug testing was associated with reductions in the rate of minor injuries with no lost work, but had no significant relationship with lost-work injuries. This associational study suggests that EAPs, especially ones that are company-staffed and ones that include telephone hotlines, may prevent workplace injuries. Copyright © 2016. Published by Elsevier Ltd.
Wilson, Kaitlyn; Buultjens, Melissa; Monfries, Melissa; Karimi, Leila
2017-01-01
Animal-Assisted Interventions (AAIs) are thought to overcome some of the limitations of traditional therapies as they do not rely exclusively on language as a medium for change. One such Animal-Assisted Therapy (AAT) approach involves horses as a therapeutic medium. Equine-Assisted Psychotherapy (EAP) comprises a collaborative effort between a licensed therapist and a horse professional working with clients to address treatment goals. The purpose of the present Australian-based qualitative study was to examine EAP facilitators' perspectives on the biospychosocial benefits and therapeutic outcomes of EAP for adolescents experiencing depression and/or anxiety. The findings suggest a range of improvements within adolescent clients, including increases in confidence, self-esteem and assertiveness, as well as a decrease in undesirable behaviours. The effectiveness of the therapy was thought to be due to the experiential nature of involving horses in therapy. The lack of understanding in the wider community about EAP was seen as a barrier to recognition and acceptance of EAP as a valid therapeutic intervention.
Roman, P M; Blum, T C
1988-01-01
Health promotion programs (HPP) and employee assistance programs (EAP) are compared in terms of their structure and process. Two common themes are extracted: a belief that both are beneficial to both employers and employees, and a sense of 'mission'. The technology of HPP and EAP are examined and compared. EAPs' stimulation from Federal funding is contrasted with the more indigenous roots of HPPs. Examination of empirical data comparing organizations with EAPs which have and have not adopted HPPs indicate the former tend to be somewhat more 'caring' toward employees. An examination of program ingredients indicates much greater commonality of structural and processual ingredients within EAPs as compared to HPPs. The extent to which each program type has become more 'populist' in orientation and the implications of these changes for program technology are considered. Finally the paper describes differences in program evaluation stemming from target group definitions in the two types of programs.
Patterns of Service Use in Two Types of Managed Behavioral Health Care Plan
Merrick, Elizabeth Levy; Hodgkin, Dominic; Hiatt, Deirdre; Horgan, Constance M.; Azzone, Vanessa; McCann, Bernard; Ritter, Grant; Zolotusky, Galina; McGuire, Thomas G.; Reif, Sharon
2009-01-01
Objective To describe service use patterns by level of care in two managed care products: employee assistance program (EAP) combined with behavioral health benefits, and standard behavioral health benefits. Methods This is a cross-sectional analysis of administrative data for 2004 from a national managed behavioral health care organization (MBHO). Utilization of 11 specific service categories was compared across products. The weighted sample reflected exact matching on sociodemographics (N= 710,014 unweighted; 286,750 weighted). Results In the EAP/behavioral health product,, the proportion of enrollees with outpatient mental health and substance abuse office visits (including EAP) was higher (p<.01), as was substance abuse day treatment/intensive outpatient care (p<.05). Use of residential substance abuse rehabilitation was lower (p<.05). Other differences were also found. Conclusion EAP/behavioral health and standard behavioral health care products had distinct utilization patterns in this large MBHO. In particular, greater use of certain outpatient services was observed within the EAP/behavioral health product. PMID:20044425
Zarkin, G A; Garfinkel, S A
1994-01-01
Workplace drug and alcohol abuse imposes substantial costs on employers. In response, employers have implemented a variety of programs to decrease substance abuse in the workplace, including drug testing, health and wellness programs, and employee assistance programs (EAPs). This paper focuses on the relationship between enterprises' organizational and health insurance characteristics and the firms' decisions to provide EAPs. Using data from the 1989 Survey of Health Insurance Plans (SHIP), sponsored by the Health Care Financing Administration (HCFA), we estimated the prevalence of EAPs by selected organizational and health insurance characteristics for those firms that offer health insurance to their workers. In addition, we estimated logistic models of the enterprises' decisions to provide EAPs as functions of the extent of state substance abuse and mental health insurance mandates, state-level demographic variables, and organizational and health insurance characteristics. Our results suggest that state mandates and demographic variables, as well as organizational and health insurance characteristics, are important explanatory variables of enterprises' decisions to provide EAPs.
Li, Erna; Wei, Xiao; Ma, Yanyan; Yin, Zhe; Li, Huan; Lin, Weishi; Wang, Xuesong; Li, Chao; Shen, Zhiqiang; Zhao, Ruixiang; Yang, Huiying; Jiang, Aimin; Yang, Wenhui; Yuan, Jing; Zhao, Xiangna
2016-01-01
Enterobacter aerogenes (Enterobacteriaceae) is an important opportunistic pathogen that causes hospital-acquired pneumonia, bacteremia, and urinary tract infections. Recently, multidrug-resistant E. aerogenes have been a public health problem. To develop an effective antimicrobial agent, bacteriophage phiEap-2 was isolated from sewage and its genome was sequenced because of its ability to lyse the multidrug-resistant clinical E. aerogenes strain 3-SP. Morphological observations suggested that the phage belongs to the Siphoviridae family. Comparative genome analysis revealed that phage phiEap-2 is related to the Salmonella phage FSL SP-031 (KC139518). All of the structural gene products (except capsid protein) encoded by phiEap-2 had orthologous gene products in FSL SP-031 and Serratia phage Eta (KC460990). Here, we report the complete genome sequence of phiEap-2 and major findings from the genomic analysis. Knowledge of this phage might be helpful for developing therapeutic strategies against E. aerogenes. PMID:27320081
Li, Erna; Wei, Xiao; Ma, Yanyan; Yin, Zhe; Li, Huan; Lin, Weishi; Wang, Xuesong; Li, Chao; Shen, Zhiqiang; Zhao, Ruixiang; Yang, Huiying; Jiang, Aimin; Yang, Wenhui; Yuan, Jing; Zhao, Xiangna
2016-06-20
Enterobacter aerogenes (Enterobacteriaceae) is an important opportunistic pathogen that causes hospital-acquired pneumonia, bacteremia, and urinary tract infections. Recently, multidrug-resistant E. aerogenes have been a public health problem. To develop an effective antimicrobial agent, bacteriophage phiEap-2 was isolated from sewage and its genome was sequenced because of its ability to lyse the multidrug-resistant clinical E. aerogenes strain 3-SP. Morphological observations suggested that the phage belongs to the Siphoviridae family. Comparative genome analysis revealed that phage phiEap-2 is related to the Salmonella phage FSL SP-031 (KC139518). All of the structural gene products (except capsid protein) encoded by phiEap-2 had orthologous gene products in FSL SP-031 and Serratia phage Eta (KC460990). Here, we report the complete genome sequence of phiEap-2 and major findings from the genomic analysis. Knowledge of this phage might be helpful for developing therapeutic strategies against E. aerogenes.
Authentication techniques for smart cards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, R.A.
1994-02-01
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
Soeker, Shaheed; Matimba, Tandokazi; Machingura, Last; Msimango, Henry; Moswaane, Bobo; Tom, Sinazo
2015-01-01
Employee assistance programs (EAPs) are responsible for helping employees cope with problems such as: mental distress, alcoholism and other drug dependencies, marital and financial difficulties--in short, the whole host of personal and family troubles endemic to the human condition. The study explored the challenges that employees who abuse substances experience when returning to work after the completion of an employee assistance program. The study used a qualitative exploratory descriptive research design. Three male participants and two key informants participated in the study. One semi structured interview was conducted with each one of the participants and one semi structured interview with the key informants. Four themes emerged: 1) Loss of one's worker role identity, 2) Negative influences of the community continues to effect the success of EAP, 3) EAP as a vehicle for change and, 4) Healthy occupations strengthen EAP. This study portrayed the following: how substance abuse effect the worker role of individuals employed in the open labor market, the challenges and facilitators experienced by employees who abuse substances when returning to their previous work roles and how occupation based interventions can be incorporated in EAP programs. Occupational therapists could use the health promotion approach, work simplification, energy conservation techniques and ergonomic analysis techniques.
On the impact of self-clearing on electroactive polymer (EAP) actuators
NASA Astrophysics Data System (ADS)
Ahmed, Saad; Ounaies, Zoubeida; Lanagan, Michael T.
2017-10-01
Electroactive polymer (EAP)-based actuators have large potential for a wide array of applications; however, their practical implementation is still a challenge because of the requirement of high driving voltage, which most often leads to premature defect-driven electrical breakdown. Polymer-based capacitors have the ability to clear defects with partial electrical breakdown and subsequent removal of a localized electrode section near the defect. In this study, this process, which is known as self-clearing, is adopted for EAP technologies. We report a methodical approach to self-clear an EAP, more specifically P(VDF-TrFE-CTFE) terpolymer, to delay premature defect-driven electrical breakdown of the terpolymer actuators at high operating electric fields. Breakdown results show that electrical breakdown strength is improved up to 18% in comparison to a control sample after self-clearing. Furthermore, the electromechanical performance in terms of blocked force and free displacement of P(VDF-TrFE-CTFE) terpolymer-based bending actuators are examined after self-clearing and precleared samples show improved blocked force, free displacement and maximum sustainable electric field compared to control samples. The study demonstrates that controlled self-clearing of EAPs improves the breakdown limit and reliability of the EAP actuators for practical applications without impeding their electromechanical performance.
Johnson, Miranda; Cockayne, Alan; Morrissey, Julie A
2008-04-01
Staphylococcus aureus biofilm formation is induced in iron-restricted growth conditions in vitro. In this study, we showed that Emp and Eap play important roles in low-iron-induced biofilm formation of S. aureus Newman. Eap and Emp are secreted proteins which are non-covalently attached to the S. aureus cell surface and have previously been implicated in a number of aspects of S. aureus pathogenesis. We showed here that the transcription of these important virulence factors is induced by growth in low-iron medium, reflective of the in vivo environment. Our results show that iron regulation of Eap and Emp is Fur independent. However, Fur is required for full induction of eap and emp expression in low-iron conditions. In this study, we demonstrated that in addition to Fur, low-iron-induced biofilm formation requires Sae, Agr, and SarA. In iron-restricted growth conditions, Sae and Agr are essential for Emp and Eap expression and hence for biofilm formation, whereas SarA appears to have a less-significant role. We also showed that expression of the ica operon is required for biofilm formation in iron-restricted growth conditions. We demonstrated that in fact, ica is required for the expression of the important multifunctional virulence determinants eap and emp.
Johnson, Miranda; Cockayne, Alan; Morrissey, Julie A.
2008-01-01
Staphylococcus aureus biofilm formation is induced in iron-restricted growth conditions in vitro. In this study, we showed that Emp and Eap play important roles in low-iron-induced biofilm formation of S. aureus Newman. Eap and Emp are secreted proteins which are non-covalently attached to the S. aureus cell surface and have previously been implicated in a number of aspects of S. aureus pathogenesis. We showed here that the transcription of these important virulence factors is induced by growth in low-iron medium, reflective of the in vivo environment. Our results show that iron regulation of Eap and Emp is Fur independent. However, Fur is required for full induction of eap and emp expression in low-iron conditions. In this study, we demonstrated that in addition to Fur, low-iron-induced biofilm formation requires Sae, Agr, and SarA. In iron-restricted growth conditions, Sae and Agr are essential for Emp and Eap expression and hence for biofilm formation, whereas SarA appears to have a less-significant role. We also showed that expression of the ica operon is required for biofilm formation in iron-restricted growth conditions. We demonstrated that in fact, ica is required for the expression of the important multifunctional virulence determinants eap and emp. PMID:18268030
Preventing Sudden Cardiac Death: Automated External Defibrillators in Ohio High Schools
Lear, Aaron; Hoang, Minh-Ha; Zyzanski, Stephen J.
2015-01-01
Context Ohio passed legislation in 2004 for optional public funding of automated external defibrillators (AEDs) in all Ohio high schools. Objective To report occurrences of sudden cardiac arrest in which AEDs were used in Ohio high schools and to evaluate the adherence of Ohio high schools with AEDs to state law and published guidelines on AEDs and emergency action plans (EAPs) in schools. Design Cross-sectional survey. Setting Web-based survey. Patients or Other Participants A total of 264 of 827 schools that were members of the Ohio High School Athletic Association. Main Outcome Measure(s) We surveyed schools on AED use, AED maintenance, and EAPs. Results Twenty-five episodes of AED deployment at 22 schools over an 11-year period were reported; 8 (32%) involved students and 17 (68%) involved adults. The reported survival rate was 60% (n = 15). Most events (n = 20, 80%) in both students and adults occurred at or near athletic facilities. The annual use rate of AEDs was 0.7%. Fifty-three percent (n = 140) of schools reported having an EAP in place for episodes of cardiac arrest. Of the schools with EAPs, 57% (n = 80) reported having rehearsed them. Conclusions Our data supported the placement of AEDs in high schools given the frequency of use for sudden cardiac arrest and the survival rate reported. They also suggested the need for increased awareness of recommendations for EAPs and the need to formulate and practice EAPs. School EAPs should emphasize planning for events in the vicinity of athletic facilities. PMID:26381367
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
2010-01-01
Conference on Advances in Cryptology, pages 169–177, London, UK, 1991. Springer-Verlag. [6] Stefan Brands and David Chaum . Distance-bounding protocols. In...Lecture Notes in Computer Science, pages 371–388. Springer, 2004. [30] Patrick Schaller, Benedikt Schmidt, David Basin, and Srdjan Capkun. Modeling and
The INDIGO-Datacloud Authentication and Authorization Infrastructure
NASA Astrophysics Data System (ADS)
Ceccanti, A.; Hardt, M.; Wegh, B.; Millar, AP; Caberletti, M.; Vianello, E.; Licehammer, S.
2017-10-01
Contemporary distributed computing infrastructures (DCIs) are not easily and securely accessible by scientists. These computing environments are typically hard to integrate due to interoperability problems resulting from the use of different authentication mechanisms, identity negotiation protocols and access control policies. Such limitations have a big impact on the user experience making it hard for user communities to port and run their scientific applications on resources aggregated from multiple providers. The INDIGO-DataCloud project wants to provide the services and tools needed to enable a secure composition of resources from multiple providers in support of scientific applications. In order to do so, a common AAI architecture has to be defined that supports multiple authentication mechanisms, support delegated authorization across services and can be easily integrated in off-the-shelf software. In this contribution we introduce the INDIGO Authentication and Authorization Infrastructure, describing its main components and their status and how authentication, delegation and authorization flows are implemented across services.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
Patient privacy protection using anonymous access control techniques.
Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V
2008-01-01
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
ERIC Educational Resources Information Center
Roe, Peter J.
1981-01-01
Addresses those readers who are not familiar with EAP, offering an introductory discussion of its objectives and methods, in two parts. Devotes the first part to the needs that justify an EAP approach, and the second to its methodology, with particular attention to interdisciplinary, task-oriented instruction. Societe Nouvelle Didier Erudition, 40…
Promises to keep. An evaluator's perspective on employee assistance programs.
Albert, W C; Smythe, P C; Brook, R C
1985-01-01
This paper presents a critical review of the rapidly expanding literature concerning employee assistance programs (EAPs). Several essential features of EAPs are identified and the assumptions underlying these components are examined. The latter section of this report offers some tentative suggestions for correcting this situation so that the EAP movement will no longer suffer from the lack of a firm database upon which to build more coherent and defensible theories and programs.
A New QKD Protocol Based upon Authentication by EPR Entanglement State
NASA Astrophysics Data System (ADS)
Abushgra, Abdulbast A.
Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the inability to provide the authentication between the end users during the quantum and classical channels. The proposed QKD protocol was designed to utilize some advantages of quantum physics as well as solid functions that are used in the classical cryptography. The authentication is a requirement during different communication channels, where both legitimate parties must confirm their identities before starting to submit data (plain-text). Moreover, the protocol uses most needed scenarios to finish the communication without leaking important data. These scenarios have been approved in existing QKD protocols either by classical or quantum systems. The matrix techniques also are used as a part of the preparation of the authentication key, where the end users communicate by an EPR (related to Einstein, Podolsky, and Rosen theory in 1935 ) channel. The EPR channel will be supported by an entanglement of particles. If the EPR communication succeeded, transferring the converted plain-text is required. Finally, both end users will have an authenticated secret key, and the submission will be done without any interruption.
Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-11-21
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-01-01
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861
Security analysis of standards-driven communication protocols for healthcare scenarios.
Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco
2012-12-01
The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.
IL17 Mediates Pelvic Pain in Experimental Autoimmune Prostatitis (EAP).
Murphy, Stephen F; Schaeffer, Anthony J; Done, Joseph; Wong, Larry; Bell-Cohn, Ashlee; Roman, Kenny; Cashy, John; Ohlhausen, Michelle; Thumbikat, Praveen
2015-01-01
Chronic pelvic pain syndrome (CPPS) is the most common form of prostatitis, accounting for 90-95% of all diagnoses. It is a complex multi-symptom syndrome with unknown etiology and limited effective treatments. Previous investigations highlight roles for inflammatory mediators in disease progression by correlating levels of cytokines and chemokines with patient reported symptom scores. It is hypothesized that alteration of adaptive immune mechanisms results in autoimmunity and subsequent development of pain. Mouse models of CPPS have been developed to delineate these immune mechanisms driving pain in humans. Using the experimental autoimmune prostatitis (EAP) in C57BL/6 mice model of CPPS we examined the role of CD4+T-cell subsets in the development and maintenance of prostate pain, by tactile allodynia behavioral testing and flow cytometry. In tandem with increased CD4+IL17A+ T-cells upon EAP induction, prophylactic treatment with an anti-IL17 antibody one-day prior to EAP induction prevented the onset of pelvic pain. Therapeutic blockade of IL17 did not reverse pain symptoms indicating that IL17 is essential for development but not maintenance of chronic pain in EAP. Furthermore we identified a cytokine, IL7, to be associated with increased symptom severity in CPPS patients and is increased in patient prostatic secretions and the prostates of EAP mice. IL7 is fundamental to development of IL17 producing cells and plays a role in maturation of auto-reactive T-cells, it is also associated with autoimmune disorders including multiple sclerosis and type-1 diabetes. More recently a growing body of research has pointed to IL17's role in development of neuropathic and chronic pain. This report presents novel data on the role of CD4+IL17+ T-cells in development and maintenance of pain in EAP and CPPS.
1999-09-01
employment assistance programs ( EAPs ). To evaluate these programs , and to provide a demographic and employment-related profile of spouses of junior enlisted...spouse Employment Assistance Program ( EAP ) services, policies, and procedures. The Army, Navy, Marine Corps, and Air Force each offer separate yet...help wanted advertisements. Only 7% were found through the Employment Assistance Program ( EAP ). Spouses faced barriers in their efforts to enter or
Educating educators about alcoholism and drug addiction: the role of employee assistance programmes.
Van den Bergh, N
1990-01-01
The historical development of employee assistance programmes (EAPs) from occupational alcoholism programmes is outlined. Services for the three prevention levels of a 'broad brush' programme are described. The 'at-risk' characteristics of academia in potentiating alcoholism and addiction are noted, including several intrinsic characteristics of academics which could predispose to substance abuse. Ways in which EAPs enhance organizational goals are noted and several crucial steps in designing an academic EAP are suggested.
Converging the capabilities of EAP artificial muscles and the requirements of bio-inspired robotics
NASA Astrophysics Data System (ADS)
Hanson, David F.; White, Victor
2004-07-01
The characteristics of Electro-actuated polymers (EAP) are typically considered inadequate for applications in robotics. But in recent years, there has been both dramatic increases in EAP technological capbilities and reductions in power requirements for actuating bio-inspired robotics. As the two trends continue to converge, one may anticipate that dramatic breakthroughs in biologically inspired robotic actuation will result due to the marraige of these technologies. This talk will provide a snapshot of how EAP actuator scientists and roboticists may work together on a common platform to accelerate the growth of both technologies. To demonstrate this concept of a platform to accelerate this convergence, the authors will discuss their work in the niche application of robotic facial expression. In particular, expressive robots appear to be within the range of EAP actuation, thanks to their low force requirements. Several robots will be shown that demonstrate realistic expressions with dramatically decreased force requirements. Also, detailed descriptions will be given of the engineering innovations that have enabled these robotics advancements-most notably, Structured-Porosity Elastomer Materials (SPEMs). SPEM manufacturing techniques create delicate cell-structures in a variety of elastomers that maintain the high elongation characteristics of the mother material, but because of the porisity, behave as sponge-materials, thus lower the force required to emulate facial expressions to levels output by several extant EAP actuators.
Edwards, Andrew M.; Bowden, Maria Gabriela; Brown, Eric L.; Laabei, Maisem; Massey, Ruth C.
2012-01-01
Staphylococcus aureus is a leading cause of bacteraemia, which frequently results in complications such as infective endocarditis, osteomyelitis and exit from the bloodstream to cause metastatic abscesses. Interaction with endothelial cells is critical to these complications and several bacterial proteins have been shown to be involved. The S. aureus extracellular adhesion protein (Eap) has many functions, it binds several host glyco-proteins and has both pro- and anti-inflammatory activity. Unfortunately its role in vivo has not been robustly tested to date, due to difficulties in complementing its activity in mutant strains. We previously found Eap to have pro-inflammatory activity, and here show that purified native Eap triggered TNFα release in whole human blood in a dose-dependent manner. This level of TNFα increased adhesion of S. aureus to endothelial cells 4-fold via a mechanism involving protein A on the bacterial surface and gC1qR/p33 on the endothelial cell surface. The contribution this and other Eap activities play in disease severity during bacteraemia was tested by constructing an isogenic set of strains in which the eap gene was inactivated and complemented by inserting an intact copy elsewhere on the bacterial chromosome. Using a murine bacteraemia model we found that Eap expressing strains cause a more severe infection, demonstrating its role in invasive disease. PMID:22905199
What lies beneath? Diffusion EAP-based study of brain tissue microstructure.
Zucchelli, Mauro; Brusini, Lorenza; Andrés Méndez, C; Daducci, Alessandro; Granziera, Cristina; Menegaz, Gloria
2016-08-01
Diffusion weighted magnetic resonance signals convey information about tissue microstructure and cytoarchitecture. In the last years, many models have been proposed for recovering the diffusion signal and extracting information to constitute new families of numerical indices. Two main categories of reconstruction models can be identified in diffusion magnetic resonance imaging (DMRI): ensemble average propagator (EAP) models and compartmental models. From both, descriptors can be derived for elucidating the underlying microstructural architecture. While compartmental models indices directly quantify the fraction of different cell compartments in each voxel, EAP-derived indices are only a derivative measure and the effect of the different microstructural configurations on the indices is still unclear. In this paper, we analyze three EAP indices calculated using the 3D Simple Harmonic Oscillator based Reconstruction and Estimation (3D-SHORE) model and estimate their changes with respect to the principal microstructural configurations. We take advantage of the state of the art simulations to quantify the variations of the indices with the simulation parameters. Analysis of in-vivo data correlates the EAP indices with the microstructural parameters obtained from the Neurite Orientation Dispersion and Density Imaging (NODDI) model as a pseudo ground truth for brain data. Results show that the EAP derived indices convey information on the tissue microstructure and that their combined values directly reflect the configuration of the different compartments in each voxel. Copyright © 2016 Elsevier B.V. All rights reserved.
Roman, Kenny; Done, Joseph D.; Schaeffer, Anthony J.; Murphy, Stephen F.; Thumbikat, Praveen
2014-01-01
Chronic prostatitis/Chronic pelvic pain syndrome (CP/CPPS) affects up to 15% of the male population and is characterized by pelvic pain. Mast cells are implicated in the murine experimental autoimmune prostatitis (EAP) model as key to chronic pelvic pain development. The mast cell mediator tryptase-β and its cognate receptor protease-activated receptor 2 (PAR2) are involved in mediating pain in other visceral disease models. Prostatic secretions and urines from CP/CPPS patients were examined for the presence of mast cell degranulation products. Tryptase-β and PAR2 expression were examined in murine experimental autoimmune prostatitis (EAP). Pelvic pain and inflammation were assessed in the presence or absence of PAR2 expression and upon PAR2 neutralization. Tryptase-β and carboxypeptidase A3 were elevated in CP/CPPS compared to healthy volunteers. Tryptase-β was capable of inducing pelvic pain and was increased in EAP along with its receptor PAR2. PAR2 was required for the development of chronic pelvic pain in EAP. PAR2 signaling in dorsal root ganglia lead to ERK1/2 phosphorylation and calcium influx. PAR2 neutralization using antibodies attenuated chronic pelvic pain in EAP. The tryptase-PAR2 axis is an important mediator of pelvic pain in EAP and may play a role in the pathogenesis of CP/CPPS. PMID:24726923
Electroactive Polymer (EAP) Actuation of Mechanisms and Robotic Devices
NASA Technical Reports Server (NTRS)
Bar-Cohen, Y.; Leary, S.; Harrison, J.; Smith, J.
1999-01-01
Actuators are responsible to the operative capability of manipulation systems and robots. In recent years, electroactive polymers (EAP) have emerged as potential alternative to conventional actuators.
Optimizing Depression Care: Opportunities for the EAP.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kreuch, Tony J.
Depression is a major workplace concern with significant impact on employee productivity, attendance and “presenteeism” and often affects the company bottom line in areas such as cost impact, employee morale, worker turnover and affected families. However, despite the frequent challenge of depression in the workplace, EAPs are often not well-equipped to fully address these employees. Often, the individual will either be directed to a 24 hour call center or seen briefly onsite by an EAP professional and referred to a treating provider without a full assessment or comprehensive approach. Diagnostic practices may be informal without use of validated tools andmore » without a full assessment of risk or identification of appropriate level of care. However, the EAP may be ideally placed within an organization to have a significant positive impact on this condition. This article will summarize my recommendations regarding EAP strategies for optimizing assessment and care for employees who are struggling with depression. I will also briefly review a working model for the assessment and treatment of depression that we have developed at my company using best practices and a collaborative model for tracking outcomes.« less
Automating individualized coaching and authentic role-play practice for brief intervention training.
Hayes-Roth, B; Saker, R; Amano, K
2010-01-01
Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.
Quantum Authencryption with Two-Photon Entangled States for Off-Line Communicants
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu
2016-02-01
In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice's classical bits with the two-photon joint measurements and authenticates the integrity of Alice's secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.
Applicability of three alternative instruments for food authenticity analysis: GMO identification.
Burrell, A; Foy, C; Burns, M
2011-03-06
Ensuring foods are correctly labelled for ingredients derived from genetically modified organisms (GMOs) is an issue facing manufacturers, retailers, and enforcement agencies. DNA approaches for the determination of food authenticitys often use the polymerase chain reaction (PCR), and PCR products can be detected using capillary or gel electrophoresis. This study examines the fitness for purpose of the application of three laboratory electrophoresis instruments (Agilent Bioanalyzer 2100, Lab901 TapeStation, and Shimadzu MCE-202 MultiNA) for the detection of GMOs using PCR based on a previously validated protocol. Whilst minor differences in the performance characteristics of bias and precision were observed, all three instruments demonstrated their applicability in using this protocol for screening of GMO ingredients.
Applicability of Three Alternative Instruments for Food Authenticity Analysis: GMO Identification
Burrell, A.; Foy, C.; Burns, M.
2011-01-01
Ensuring foods are correctly labelled for ingredients derived from genetically modified organisms (GMOs) is an issue facing manufacturers, retailers, and enforcement agencies. DNA approaches for the determination of food authenticitys often use the polymerase chain reaction (PCR), and PCR products can be detected using capillary or gel electrophoresis. This study examines the fitness for purpose of the application of three laboratory electrophoresis instruments (Agilent Bioanalyzer 2100, Lab901 TapeStation, and Shimadzu MCE-202 MultiNA) for the detection of GMOs using PCR based on a previously validated protocol. Whilst minor differences in the performance characteristics of bias and precision were observed, all three instruments demonstrated their applicability in using this protocol for screening of GMO ingredients. PMID:21527985
Monfils, M K
1995-05-01
1. The functions of a continuous quality improvement tool used by Deming--the Plan, Do, Check, Act Cycle--can be applied to the assessment, implementation, and ongoing evaluation of an Employee Assistance Program (EAP). 2. Various methods are available to assess the need for an EAP. As much data as possible should be collected to qualify and quantify the need so that management can make an informed decision and develop measures to determine program effectiveness. 3. Once an EAP is implemented, it should be monitored continually against the effectiveness measures initially developed. Using a continuous quality improvement process, the occupational health nurse and the EAP provider can establish a dynamic relationship that allows for growth beyond the original design and increased effectiveness of service to employees.
Early access programs: Benefits, challenges, and key considerations for successful implementation
Patil, Sanjaykumar
2016-01-01
Early access programs, (EAPs) are adopted by an increasing number of pharma companies due to several benefits offered by these programs. EAPs offer ethical, compliant, and controlled mechanisms of access to investigational drugs outside of the clinical trial space and before the commercial launch of the drug, to patients with life-threatening diseases having no treatment options available. In addition to the development of positive relationships with key opinion leaders (KOL), patients, advocacy groups and regulators, the data captured from the implementation of EAPs supports in the formulation of global commercialization strategies. This white paper outlines various circumstances to be considered for the implementation of EAPs named patient programs, the regulatory landscape, the benefits and challenges associated with implementing these programs and the key considerations for their successful implementation. PMID:26955570
Liu, Ching Ming; Chang, Fang Chia; Lin, Chung Tien
2016-09-30
This study was conducted to evaluate new acupuncture protocols for the clinical treatment of cervical spinal cord diseases in 19 dogs. Three treatment options containing Jing-jiaji (cervical jiaji) were developed to treat neck pain, hemiparesis, and tetraparesis depending on the severity. The interval between the neurological disease onset and treatment (duration of signs), time to improvement after treatment, and recovery time were compared in dogs by body weight, age, and dry needle acupuncture (AP) with or without electro-AP (EAP). The duration of signs was longer in dogs weighing greater than 10 kg than in those weighing less than 10 kg (p< 0.05). Improvement and recovery times did not vary by body weight. Additionally, improvement and recovery times did not vary by age. The improvement and recovery times were longer in the AP+EAP group than the AP group (p< 0.05). Acupuncture with Jing-jiaji was effective in cervical spinal cord diseases in different sized dogs and in middle-aged and senior dogs. This report standardized AP treatment containing Jing-jiaji for canine cervical problems and evaluated its effects. The newly standardized AP methodology offers clinical practitioners an effective way to improve the outcomes of cervical neurological diseases in dogs.
Equine-assisted psychotherapy in clinical practice.
Masini, Angela
2010-10-01
Equine-assisted psychotherapy (EAP) is an approach in which horses are an integral part of the therapeutic process. This article provides an overview of EAP, including a brief historical perspective, key definitions, and review of pertinent literature. Benefits of the approach are presented, from the standpoint of field observations, client self-reports, and formal research articles. Rather than offer a comprehensive literature review, this article is intended to help non-EAP practitioners become more familiar with the approach. Copyright 2010, SLACK Incorporated.
New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2
2010-09-01
integrity, by the authentication of packets or messages, and confidentiality. These are discussed in the following sections. Issues of availability...fully specified, in [2] is the addition of a TLV including a cryptographic signature that will allow the authentication of the received information...The objective is to ensure the integrity of the ad hoc network, that only authorised routers can join the network because unauthorised routers will
Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133
Wireless technology infrastructures for authentication of patients: PKI that rings.
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.
2013-01-01
Background To isolate over-secretors, we subjected to saturation mutagenesis, a strain of P.pastoris exporting E. coli alkaline phosphatase (EAP) fused to the secretory domain of the yeast α factor pheromone through cellular PHO1/KEX2 secretory processing signals as the α-sec-EAP reporter protein. Direct chromogenic staining for α-sec-EAP activity is non-specific as its NBT/BCIP substrate cross-reacts with cellular phosphatases which can be inhibited with Levulinic acid. However, the parental E(P) strain only exports detectable levels of α-sec-EAP at 69 hours and not within the 36 hour period post-seeding required for effective screening with the consequent absence of a reference for secretion. We substituted the endogenous cellular phosphatase activity as a comparative reference for secretion rate and levels as well as for colony alignment while elevating specificity and sensitivity of detection of the exported protein with other innovative modifications of the immuno-chromogenic staining application for screening protein export mutants. Results Raising the specificity and utility of staining for α-sec-EAP activity required 5 modifications including some to published methods. These included, exploitation of endogenous phosphatase activity, reduction of the cell/protein burden, establishment of the direct relation between concentrations of transcriptional inducer and exported membrane immobilized protein and concentrations of protein exported into growth media, amplification of immuno-specificity and sensitivity of detection of α-sec-EAP reporter enzyme signal and restriction of staining to optimal concentrations of antisera and time periods. The resultant immuno-chromogenic screen allows for the detection of early secretion and as little as 1.3 fold over-secretion of α-sec-EAP reporter protein by E(M) mutants in the presence of 10 fold -216 fold higher concentrations of HSA. Conclusions The modified immuno-chromogenic screen is sensitive, specific and has led to the isolation of mutants E(M) over-secreting the α-sec-EAP reporter protein by a minimum of 50 fold higher levels than that exported by non-mutagenized E(P) parental strains. Unselected proteins were also over-secreted. PMID:23602005
Calculation of key reduction for B92 QKD protocol
NASA Astrophysics Data System (ADS)
Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav
2015-05-01
It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.
DNA-based techniques for authentication of processed food and food supplements.
Lo, Yat-Tung; Shaw, Pang-Chui
2018-02-01
Authentication of food or food supplements with medicinal values is important to avoid adverse toxic effects, provide consumer rights, as well as for certification purpose. Compared to morphological and spectrometric techniques, molecular authentication is found to be accurate, sensitive and reliable. However, DNA degradation and inclusion of inhibitors may lead to failure in PCR amplification. This paper reviews on the existing DNA extraction and PCR protocols, and the use of small size DNA markers with sufficient discriminative power for molecular authentication. Various emerging new molecular techniques such as isothermal amplification for on-site diagnosis, next-generation sequencing for high-throughput species identification, high resolution melting analysis for quick species differentiation, DNA array techniques for rapid detection and quantitative determination in food products are also discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen
2016-01-01
Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.
Employee assistance programs in the hospital industry.
Howard, J C; Szczerbacki, D
1988-01-01
The health care literature describes the industry's need for employee assistance programs (EAPs). New research results show the degree to which EAPs are used in the industry and ways to determine their success.
Dual-responsive soft actuators based on self-assembled polymers
NASA Astrophysics Data System (ADS)
Kim, Seung Jae; Park, Moon Jeong
Electroactive polymer actuators (EAPs) have been extensively studied for biomimetic technologies such as artificial muscles and soft robotics. While a large deformation can be achievable from EAPs under relatively low-driving voltages, the slow response time has long been a fundamental drawback of EAPs. Here, we investigate a new soft actuator capable of responding two different external stimuli. The actuator is composed of electroactive polymer and light-responsive polymer. We have employed ionic block copolymers having well-connected ion-conduction channels to raise response to electric-field. Light-responsive polymers were additionally incorporated into them to control the deformation of the actuator in an independent manner. Noteworthy observation in the present study is that the dual-responsive polymers resulted in synergetic achievement of high bending strain and fast response time, which marked a significant improvement from the conventional EAPs.
Androids: application of EAP as artificial muscles to entertainment industry
NASA Technical Reports Server (NTRS)
Hanson, D.; Pioggia, G.; Bar-Cohen, Yoseph; de Rossi, D.
2001-01-01
The classic movie Metropolis (1926), which is nowadays considered a cinema milestone, has shown the possibility to build robots called androids that are science and fiction run together to realize a dream: the human-like robot. In that movie, Dr. Rotwang transforms a simple and cold calculating robot into the body of a beautiful woman. Robots have often been depicted as metal creatures with cold steel bodies, but there is no reason why metals should be the only kind of material for construction of robots. The authors examined the issues related to applying electroactive polymers materials (EAP) to the entertainment industry. EAP are offering attractive characteristics with the potential to produce more realistic models of living creatures at significantly lower cost. This paper seeks to elucidate how EAP might infiltrate and ultimately revolutionize entertainment, showing some applicative examples.
A study of metalized electrode self-clearing in electroactive polymer (EAP) based actuators
NASA Astrophysics Data System (ADS)
Ahmed, Saad; Ounaies, Zoubeida
2016-04-01
Electroactive polymer (EAP) based technologies have shown promise in areas such as artificial muscles, actuator, aerospace, medical and soft robotics. Still challenges remain such as low induced forces and defects-driven electrical breakdown, which impede the practical implementation of this technology. Multilayered or stacked configuration can address the low induced force issue whereas self-clearing can be a technique to improve breakdown limit of EAP based actuators. Self-clearing refers to the partial local breakdown of dielectric medium due to the presence of impurities, which in turn results in the evaporation of some of the metalized electrode. After this evaporation, the impurity is cleared and any current path would be safely cut off, which means the actuator continues to perform. It is a widely studied concept in the capacitor community, while it has not been studied much for EAP technologies. In this paper we report a systematic approach to precondition a silver-metalized electroactive polymer (EAP), more specifically P(VDF-TrFE-CTFE) terpolymer, using self-clearing concept. First, we show improvement in the dielectric breakdown strength of EAP based unimorph actuators after pre-clearing the impurities using low electric field (lower than dielectric breakdown of the terpolymer). Inspired by this improvement, we used Weibull statistics to systematically estimate the self-clearing/ preconditioning field needed to clear the defects. Then electrical breakdown experiments are conducted with and without preconditioning the samples to investigate its effect on the breakdown strength of the sample.
Numerical study on 3D composite morphing actuators
NASA Astrophysics Data System (ADS)
Oishi, Kazuma; Saito, Makoto; Anandan, Nishita; Kadooka, Kevin; Taya, Minoru
2015-04-01
There are a number of actuators using the deformation of electroactive polymer (EAP), where fewer papers seem to have focused on the performance of 3D morphing actuators based on the analytical approach, due mainly to their complexity. The present paper introduces a numerical analysis approach on the large scale deformation and motion of a 3D half dome shaped actuator composed of thin soft membrane (passive material) and EAP strip actuators (EAP active coupon with electrodes on both surfaces), where the locations of the active EAP strips is a key parameter. Simulia/Abaqus Static and Implicit analysis code, whose main feature is the high precision contact analysis capability among structures, are used focusing on the whole process of the membrane to touch and wrap around the object. The unidirectional properties of the EAP coupon actuator are used as input data set for the material properties for the simulation and the verification of our numerical model, where the verification is made as compared to the existing 2D solution. The numerical results can demonstrate the whole deformation process of the membrane to wrap around not only smooth shaped objects like a sphere or an egg, but also irregularly shaped objects. A parametric study reveals the proper placement of the EAP coupon actuators, with the modification of the dome shape to induce the relevant large scale deformation. The numerical simulation for the 3D soft actuators shown in this paper could be applied to a wider range of soft 3D morphing actuators.
Employee assistance program treats personal problems.
Bednarek, R J; Featherston, H J
1984-03-01
Though the concept of employee assistance programs (EAPs) is widely accepted throughout business and industry, few hospitals have established similar channels for dealing with workers whose personal problems cause work-related problems. Among the reasons for the health care profession's lack of involvement in this area are: lack of information about costs and benefits of EAPs; the hospital's multidisciplinary environment in which standards of employee competence and behavior are set by persons from many disciplines; hospital working hours; and health care workers' attitudes about their vulnerability to illness. St. Benedict's Hospital, Ogden, UT, however, has confronted the question of how to demonstrate Christian concern for its employees. St. Benedict's EAP, the Helping Hand, which was created in 1979, combines progressive disciplinary action with the opportunity for early intervention in and treatment of employees' personal problems. When a worker with personal problems is referred to the EAP coordinator, he or she is matched with the appropriate community or hospital resource for treatment. Supervisors are trained to identify employee problems and to focus on employee job performance rather than on attempting to diagnose the problem. St. Benedict's records during the program's first three years illustrate the human benefits as well as the cost savings of an EAP. Of 92 hospital employees who took part in the EAP, 72 improved their situations or resolved their problems. The hospital's turnover rates declined from 36 percent to 20 percent, and approximately $40,800 in turnover and replacement costs were saved.
Shea, S; Sengupta, S; Crosswell, A; Clayton, P D
1992-01-01
The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
An all-organic composite actuator material with a high dielectric constant.
Zhang, Q M; Li, Hengfeng; Poh, Martin; Xia, Feng; Cheng, Z-Y; Xu, Haisheng; Huang, Cheng
2002-09-19
Electroactive polymers (EAPs) can behave as actuators, changing their shape in response to electrical stimulation. EAPs that are controlled by external electric fields--referred to here as field-type EAPs--include ferroelectric polymers, electrostrictive polymers, dielectric elastomers and liquid crystal polymers. Field-type EAPs can exhibit fast response speeds, low hysteresis and strain levels far above those of traditional piezoelectric materials, with elastic energy densities even higher than those of piezoceramics. However, these polymers also require a high field (>70 V micro m(-1)) to generate such high elastic energy densities (>0.1 J cm(-3); refs 4, 5, 9, 10). Here we report a new class of all-organic field-type EAP composites, which can exhibit high elastic energy densities induced by an electric field of only 13 V micro m(-1). The composites are fabricated from an organic filler material possessing very high dielectric constant dispersed in an electrostrictive polymer matrix. The composites can exhibit high net dielectric constants while retaining the flexibility of the matrix. These all-organic actuators could find applications as artificial muscles, 'smart skins' for drag reduction, and in microfluidic systems for drug delivery.
Ito, H; Fujii, K; Sasaki, Y
1998-01-01
The purpose of this paper is to clarify some patterns of utilization of an external employee assistance program (EAP) we have conducted for other public and private facilities in the Tokyo Kenbikyoin Foundation between April, 1986 and December, 1996. The subjects were 26 men and 12 women in 7 facilities under the following conditions: (1) Employees who have already had their own psychiatrists at the first interview of the external EAP; (2) Facilities utilize the EAP for two or more employees who met the first criterion. As a result, utilization patterns differed depending on medical staff's attitude toward the external EAP. There was a significant difference according to sex. The rate for men was 54% in worksites where medical staff understood this external program (worksite A1) and 93% in worksites where they did not (worksite A2-3, B). As to expectations for the program, there were more consultations for organizational measurements (63%) in worksite A1, while less organizational matters (27%) and more personal complains about their psychiatrists in the worksite A2-3, and B. These results suggest that the involvement of medical staff is the key to utilizing the external EAP effectively.
Role of the employee assistance program in helping the troubled worker.
Fitzgerald, S T; Hammond, S C; Harder, K A
1989-01-01
The worksite has been identified as the most logical setting for providing primary preventive health care efforts that will reduce health care costs. Hazeldon Research Services in their review entitled, "The Cost-Impact of Employee Assistance and Chemical Dependency Treatment Programs," concluded that a significant savings for organizations has been demonstrated by EAP treatment programs. This group also concluded that work remains for service providers, the community, industry, and government to identify the balance between reasonable costs and quality of care. Roman has found that EAPs are becoming more acceptable to management as a means of addressing a broad range of employee problems. In addition, Roman has found that there is recognition by management that many employees have problems that affect job performance. Such problems may include substance abuse, relationship difficulties, absenteeism, and burnout. EAP services have evolved from occupational alcoholism programs to include a broad array of services, and they can be scaled to fit the size and needs of a particular company. Even if only limited services are offered, the EAP must adhere to high standards. Competent employee evaluation and appropriate referrals are necessary in EAPs with even the smallest of scopes.
A brief intervention for at-risk drinking in an employee assistance program.
Osilla, Karen Chan; Zellmer, Steven P; Larimer, Mary E; Neighbors, Clayton; Marlatt, G Alan
2008-01-01
The current pilot study examined the preliminary efficacy of a brief intervention (BI) for at-risk drinking in an employee assistance program. Clients (N = 107) entering the employee assistance program (EAP) for mental health services were screened and met criteria for at-risk drinking. EAP therapists were randomly assigned to deliver either the BI plus EAP services as usual (SAU) or SAU only. Participants in the final analyses consisted of 44 BI + SAU (30 women, 14 men) and 30 SAU (21 women, 9 men) EAP clients who completed a 3-month follow-up. Results suggested that participants in the BI + SAU group had significant reductions in peak blood alcohol concentration, peak quantity, and alcohol-related consequences compared with the SAU group. Men in the BI + SAU group had greater reductions in alcohol-related problems compared with men in the SAU group. Groups did not differ by number of total EAP sessions attended or rates of presenting problem resolution. Results provide preliminary evidence to support the integration of alcohol screening and BI as a low-cost method of intervening with clients with at-risk drinking in the context of co-occurring presenting problems.
Controllable Curved Mirrors Made from Single-Layer EAP Films
NASA Technical Reports Server (NTRS)
Bao, Xiaoqi; Bar-Cohen, Yoseph; Sherrit, Stewart
2004-01-01
A document proposes that lightweight, deployable, large-aperture, controllable curved mirrors made of reflectively coated thin electroactive-polymer (EAP) films be developed for use in spaceborne microwave and optical systems. In these mirrors, the EAP films would serve as both structures and actuators. EAPs that are potentially suitable for such use include piezoelectric, electrostrictive, ferroelectric, and dielectric polymers. These materials exhibit strains proportional to the squares of applied electric fields. Utilizing this phenomenon, a curved mirror according to the proposal could be made from a flat film, upon which a nonuniform electrostatic potential (decreasing from the center toward the edge) would be imposed to obtain a required curvature. The effect would be analogous to that of an old-fashioned metalworking practice in which a flat metal sheet is made into a bowl by hammering it repeatedly, the frequency of hammer blows decreasing with distance from the center. In operation, the nonuniform electrostatic potential could be imposed by use of an electron gun. Calculations have shown that by use of a single- layer film made of a currently available EAP, it would be possible to control the focal length of a 2-m-diameter mirror from infinity to 1.25 m.
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
Vavrek, Jayson R; Henderson, Brian S; Danagoulian, Areg
2018-04-24
Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618-8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal from the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy "genuine" and "hoax" objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.
Molecules for security measures: from keypad locks to advanced communication protocols.
Andréasson, J; Pischel, U
2018-04-03
The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.
Design and Implementation of a Secure Modbus Protocol
NASA Astrophysics Data System (ADS)
Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.
EAP actuators aid the quest for the 'Holy Braille' of tactile displays
NASA Astrophysics Data System (ADS)
Runyan, Noel; Blazie, Deane
2010-04-01
The authors present the worldwide need for electronic Braille displays to promote literacy among the blind. The use of of EAP's to produce Braille displays is encouraged and detailed descriptions of the technology of Braille are presented. Prior art is covered since the early 1950's through present day displays based mostly on piezoelectric technologies. EAP's offer the promise of the "Holy Braille", the ability to display a full page of Braille electronically. Details on "how not to make a Braille display" are covered in prior art.
Encapsulation of ionic electroactive polymers: reducing the interaction with environment
NASA Astrophysics Data System (ADS)
Jaakson, P.; Aabloo, A.; Tamm, T.
2016-04-01
Ionic electro-active polymer (iEAP) actuators are composite materials that change their mechanical properties in response to external electrical stimulus. The interest in these devices is mainly driven by their capability to generate biomimetic movements, and their potential use in soft robotics. The driving voltage of an iEAP-actuator (0.5… 3 V) is at least an order of magnitude lower than that needed for other types of electroactive polymers. To apply iEAP-actuators in potential real-world applications, the capability of operating in different environments (open air, different solvents) must be available. In their natural form, the iEAP-actuators are capable of interacting with the surrounding environment (evaporation of solvent from the electrolyte solution, ion or solvent exchange, humidity effects), therefore, for prevention of unpredictable behavior of the actuator and the contamination of the environment, encapsulation of the actuator is needed. The environmental contamination aspect of the encapsulation material is substantial when selecting an applicable encapsulant. The suitable encapsulant should form thin films, be light in weight, elastic, fit tightly, low cost, and easily reproducible. The main goal of the present study is to identify and evaluate the best potential encapsulation techniques for iEAPactuators. Various techniques like thin film on liquid coating, dip coating, hot pressing, hot rolling; and several materials like polydimethylsiloxane, polyurethane, nitrocellulose, paraffin-composite-films were investigated. The advantages and disadvantages of the combinations of the above mentioned techniques and materials are discussed. Successfully encapsulated iEAP-actuators gained durability and were stably operable for long periods of time under ambient conditions. The encapsulation process also increased the stability of the iEAP-actuator by minimizing the environment effects. This makes controlling iEAP-actuators more straight-forward and reliable since there is no need to take the environmental factors like relative humidity and/or gas circulation into account.
IL17 Mediates Pelvic Pain in Experimental Autoimmune Prostatitis (EAP)
Murphy, Stephen F.; Schaeffer, Anthony J.; Done, Joseph; Wong, Larry; Bell-Cohn, Ashlee; Roman, Kenny; Cashy, John; Ohlhausen, Michelle; Thumbikat, Praveen
2015-01-01
Chronic pelvic pain syndrome (CPPS) is the most common form of prostatitis, accounting for 90–95% of all diagnoses. It is a complex multi-symptom syndrome with unknown etiology and limited effective treatments. Previous investigations highlight roles for inflammatory mediators in disease progression by correlating levels of cytokines and chemokines with patient reported symptom scores. It is hypothesized that alteration of adaptive immune mechanisms results in autoimmunity and subsequent development of pain. Mouse models of CPPS have been developed to delineate these immune mechanisms driving pain in humans. Using the experimental autoimmune prostatitis (EAP) in C57BL/6 mice model of CPPS we examined the role of CD4+T-cell subsets in the development and maintenance of prostate pain, by tactile allodynia behavioral testing and flow cytometry. In tandem with increased CD4+IL17A+ T-cells upon EAP induction, prophylactic treatment with an anti-IL17 antibody one-day prior to EAP induction prevented the onset of pelvic pain. Therapeutic blockade of IL17 did not reverse pain symptoms indicating that IL17 is essential for development but not maintenance of chronic pain in EAP. Furthermore we identified a cytokine, IL7, to be associated with increased symptom severity in CPPS patients and is increased in patient prostatic secretions and the prostates of EAP mice. IL7 is fundamental to development of IL17 producing cells and plays a role in maturation of auto-reactive T-cells, it is also associated with autoimmune disorders including multiple sclerosis and type-1 diabetes. More recently a growing body of research has pointed to IL17’s role in development of neuropathic and chronic pain. This report presents novel data on the role of CD4+IL17+ T-cells in development and maintenance of pain in EAP and CPPS. PMID:25933188
Educating Organizational Consumers about Employee Assistance Programs.
ERIC Educational Resources Information Center
Roman, Paul M.; And Others
1987-01-01
Provides an overview of the value of employee assistance programs (EAP) as mechanisms to solve organizational problems. The article is based on a field study of 480 EAPs in private sector organizations with 500 or more employees. (JOW)
How to Help When Personal Problems Stymie Your Staff.
ERIC Educational Resources Information Center
Rice, Wandalyn
1983-01-01
A number of school districts have set up employee assistance programs (EAP) that offer help for employees having personal or family problems that affect their job performance. Guidelines for establishing an EAP are offered. (MLF)
Bjornson, B H; Agura, E; Harvey, J M; Johns, M; Andrews, R G; McCabe, W R
1988-01-01
Proteins coextracted with endotoxin, termed endotoxin-associated protein (EAP), have been shown to exert interleukin 1-like activities. The present studies demonstrate that EAP also exerts potent granulopoietic colony-stimulating activity (CSA) on human peripheral blood and bone marrow progenitor cells, comparable to that seen with various types of conditioned media. The CSA observed with EAP appeared to be heat (100 degrees C, 30 min) and trypsin resistant and partially pronase resistant. Similar resistance was observed with the porin proteins of the outer membrane of gram-negative bacteria, and similar CSA activity was observed with a purified porin preparation of Neisseria gonorrhoeae. The CSA of EAP could be demonstrated in human peripheral blood and bone marrow leukocytes rigorously depleted of monocytes, T lymphocytes, and B lymphocytes by treatment with specific monoclonal antibodies and complement. PMID:2836311
Electroactive polymer (EAP) actuators for future humanlike robots
NASA Astrophysics Data System (ADS)
Bar-Cohen, Yoseph
2009-03-01
Human-like robots are increasingly becoming an engineering reality thanks to recent technology advances. These robots, which are inspired greatly by science fiction, were originated from the desire to reproduce the human appearance, functions and intelligence and they may become our household appliance or even companion. The development of such robots is greatly supported by emerging biologically inspired technologies. Potentially, electroactive polymer (EAP) materials are offering actuation capabilities that allow emulating the action of our natural muscles for making such machines perform lifelike. There are many technical issues related to making such robots including the need for EAP materials that can operate as effective actuators. Beside the technology challenges these robots also raise concerns that need to be addressed prior to forming super capable robots. These include the need to prevent accidents, deliberate harm, or their use in crimes. In this paper, the potential EAP actuators and the challenges that these robots may pose will be reviewed.
Electroactive Polymer (EAP) Actuators for Future Humanlike Robots
NASA Technical Reports Server (NTRS)
Bar-Cohen, Yoseph
2009-01-01
Human-like robots are increasingly becoming an engineering reality thanks to recent technology advances. These robots, which are inspired greatly by science fiction, were originated from the desire to reproduce the human appearance, functions and intelligence and they may become our household appliance or even companion. The development of such robots is greatly supported by emerging biologically inspired technologies. Potentially, electroactive polymer (EAP) materials are offering actuation capabilities that allow emulating the action of our natural muscles for making such machines perform lifelike. There are many technical issues related to making such robots including the need for EAP materials that can operate as effective actuators. Beside the technology challenges these robots also raise concerns that need to be addressed prior to forming super capable robots. These include the need to prevent accidents, deliberate harm, or their use in crimes. In this paper, the potential EAP actuators and the challenges that these robots may pose will be reviewed.
NASA Astrophysics Data System (ADS)
Xu, Zhiqing; Fan, Ke; Wang, HuiJun
2017-09-01
The severe drought over northeast Asia in summer 2014 and the contribution to it by sea surface temperature (SST) anomalies in the tropical Indo-Pacific region were investigated from the month-to-month perspective. The severe drought was accompanied by weak lower-level summer monsoon flow and featured an obvious northward movement during summer. The mid-latitude Asian summer (MAS) pattern and East Asia/Pacific teleconnection (EAP) pattern, induced by the Indian summer monsoon (ISM) and western North Pacific summer monsoon (WNPSM) rainfall anomalies respectively, were two main bridges between the SST anomalies in the tropical Indo-Pacific region and the severe drought. Warming in the Arabian Sea induced reduced rainfall over northeast India and then triggered a negative MAS pattern favoring the severe drought in June 2014. In July 2014, warming in the tropical western North Pacific led to a strong WNPSM and increased rainfall over the Philippine Sea, triggering a positive EAP pattern. The equatorial eastern Pacific and local warming resulted in increased rainfall over the off-equatorial western Pacific and triggered an EAP-like pattern. The EAP pattern and EAP-like pattern contributed to the severe drought in July 2014. A negative Indian Ocean dipole induced an anomalous meridional circulation, and warming in the equatorial eastern Pacific induced an anomalous zonal circulation, in August 2014. The two anomalous cells led to a weak ISM and WNPSM, triggering the negative MAS and EAP patterns responsible for the severe drought. Two possible reasons for the northward movement of the drought were also proposed.
Secure voice-based authentication for mobile devices: vaulted voice verification
NASA Astrophysics Data System (ADS)
Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.
2013-05-01
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.
14 CFR 120.115 - Employee Assistance Program (EAP).
Code of Federal Regulations, 2012 CFR
2012-01-01
... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS DRUG AND ALCOHOL TESTING PROGRAM Drug Testing Program Requirements § 120.115 Employee Assistance Program (EAP). (a... employer's drug testing plan submitted to the FAA for approval. ...
14 CFR 120.115 - Employee Assistance Program (EAP).
Code of Federal Regulations, 2011 CFR
2011-01-01
... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS DRUG AND ALCOHOL TESTING PROGRAM Drug Testing Program Requirements § 120.115 Employee Assistance Program (EAP). (a... employer's drug testing plan submitted to the FAA for approval. ...
14 CFR 120.115 - Employee Assistance Program (EAP).
Code of Federal Regulations, 2013 CFR
2013-01-01
... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS DRUG AND ALCOHOL TESTING PROGRAM Drug Testing Program Requirements § 120.115 Employee Assistance Program (EAP). (a... employer's drug testing plan submitted to the FAA for approval. ...
14 CFR 120.115 - Employee Assistance Program (EAP).
Code of Federal Regulations, 2010 CFR
2010-01-01
... (CONTINUED) AIR CARRIERS AND OPERATORS FOR COMPENSATION OR HIRE: CERTIFICATION AND OPERATIONS DRUG AND ALCOHOL TESTING PROGRAM Drug Testing Program Requirements § 120.115 Employee Assistance Program (EAP). (a... employer's drug testing plan submitted to the FAA for approval. ...
System M: A Program Logic for Code Sandboxing and Identification
2014-07-22
M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. In Proc. FAST’09, 2010. [8] A. Datta, A. Derek, J. C. Mitchell...11] S. Delaune, S. Kremer, M. D. Ryan, and G. Steel. A formal analysis of authentication in the TPM. In Proc. FAST’10, 2011. [12] S. Delaune, S...A. Jeffrey. Authenticity by typing for security protocols. Journal of Computer Security, 11(4):451–519, July 2003. [16] S. Gürgens, C. Rudolph, D
Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks
2008-08-27
Message Authentication Code-Message Digest 5-96). Due to the processing power consumption and slowness of public key authentication methods, RSA ...MODP) group with a 768 -bit modulus 2. a MODP group with a 1024-bit modulus 3. an Elliptic Curve Group over GF[ 2n ] (EC2N) group with a 155-bit...nonces, digital signatures using the Digital Signature Algorithm, and the Rivest-Shamir- Adelman ( RSA ) algorithm. For more information about the
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
NASA Astrophysics Data System (ADS)
Papamanthou, Charalampos; Tamassia, Roberto
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client's database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their integrity when they retrieve them. In this paper, we present a model and protocol for two-party authentication of data structures. Namely, a client outsources its data structure and verifies that the answers to the queries have not been tampered with. We provide efficient algorithms to securely outsource a skip list with logarithmic time overhead at the server and client and logarithmic communication cost, thus providing an efficient authentication primitive for outsourced data, both structured (e.g., relational databases) and semi-structured (e.g., XML documents). In our technique, the client stores only a constant amount of space, which is optimal. Our two-party authentication framework can be deployed on top of existing storage applications, thus providing an efficient authentication service. Finally, we present experimental results that demonstrate the practical efficiency and scalability of our scheme.
Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation.
Marcel, Sébastien; Millán, José Del R
2007-04-01
In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future. However, very little work has been done in this area and was focusing mainly on person identification but not on person authentication. Person authentication aims to accept or to reject a person claiming an identity, i.e., comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database. We propose the use of a statistical framework based on Gaussian Mixture Models and Maximum A Posteriori model adaptation, successfully applied to speaker and face authentication, which can deal with only one training session. We perform intensive experimental simulations using several strict train/test protocols to show the potential of our method. We also show that there are some mental tasks that are more appropriate for person authentication than others.
Suhr, Anna Catharina; Vogeser, Michael; Grimm, Stefanie H
2016-05-30
For quotable quantitative analysis of endogenous analytes in complex biological samples by isotope dilution LC-MS/MS, the creation of appropriate calibrators is a challenge, since analyte-free authentic material is in general not available. Thus, surrogate matrices are often used to prepare calibrators and controls. However, currently employed validation protocols do not include specific experiments to verify the suitability of a surrogate matrix calibration for quantification of authentic matrix samples. The aim of the study was the development of a novel validation experiment to test whether surrogate matrix based calibrators enable correct quantification of authentic matrix samples. The key element of the novel validation experiment is the inversion of nonlabelled analytes and their stable isotope labelled (SIL) counterparts in respect to their functions, i.e. SIL compound is the analyte and nonlabelled substance is employed as internal standard. As a consequence, both surrogate and authentic matrix are analyte-free regarding SIL analytes, which allows a comparison of both matrices. We called this approach Isotope Inversion Experiment. As figure of merit we defined the accuracy of inverse quality controls in authentic matrix quantified by means of a surrogate matrix calibration curve. As a proof-of-concept application a LC-MS/MS assay addressing six corticosteroids (cortisol, cortisone, corticosterone, 11-deoxycortisol, 11-deoxycorticosterone, and 17-OH-progesterone) was chosen. The integration of the Isotope Inversion Experiment in the validation protocol for the steroid assay was successfully realized. The accuracy results of the inverse quality controls were all in all very satisfying. As a consequence the suitability of a surrogate matrix calibration for quantification of the targeted steroids in human serum as authentic matrix could be successfully demonstrated. The Isotope Inversion Experiment fills a gap in the validation process for LC-MS/MS assays quantifying endogenous analytes. We consider it a valuable and convenient tool to evaluate the correct quantification of authentic matrix samples based on a calibration curve in surrogate matrix. Copyright © 2016 Elsevier B.V. All rights reserved.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160
EAP as artificial muscles - progress and challenges
NASA Technical Reports Server (NTRS)
Bar-Cohen, Yoseph
2004-01-01
During the last decade and a half new polymers have emerged that respond to electrical stimulation with a significant shape or size change. This capability of electroactive polymer (EAP) materials is attracting the attention of engineers and scientists from many different disciplines.
20 CFR 408.1030 - When can you use the expedited appeals process?
Code of Federal Regulations, 2010 CFR
2010-04-01
... appeals process (EAP), you may go directly to a Federal District Court without first completing the administrative review process. For purposes of this part, we use the same EAP rules we use in the title XVI...
New Horizons in Organizational Stress Prevention Approaches.
ERIC Educational Resources Information Center
McGaffey, Thomas N.
1978-01-01
Discusses and describes some active Employee Assistance Programs (EAPs). An EAP is a stress intervention program that, when combined with other stress prevention procedures, can serve as an effective base for developing a comprehensive managerial system for combating organizational stress. (Author/IRT)
Employee Assistance Programs in Canada.
ERIC Educational Resources Information Center
Jaffe, Peter; And Others
1988-01-01
Employee assistance programs (EAP) are evaluated in questionnaire responses from 73 of 109 (67 percent) Canadian school boards and 35 (50 percent) of the clients of the EAP in London, Ontario. Explores the nature of current programs and emerging trends in this field. (MLF)
DeFraia, Gary S
2013-01-01
Central to the field of trauma psychology is assessment of the impact of critical incidents on individuals, as measured by individual symptoms of stress. Accordingly, the trauma literature reflects a proliferation of clinical impact of event scales. Workplace incidents however, affect not only individual employees, but also work organizations, requiring a multi-level response. Critical incident stress management (CISM) is the most prevalent multi-level incident response strategy utilized by organizations, often through specialized CISM units operating within their employee assistance programs (EAPs). While EAP-based CISM units seeks to support both individuals and organizations, studies focused on individual stress dominate the literature, mirroring assessment scales that tend to emphasize clinical as opposed to organizational practice. This research contributes to less-prevalent studies exploring incident characteristics as disruptive to organizations, rather than clinical symptoms as disruptive to individuals. To measure incident disruption, an EAP-based CISM unit developed a critical incident severity scale. By analyzing this unit's extensive practice database, this exploratory study examines how critical incident severity level varies among various types of incidents. Employing the methodology of clinical data mining, this practice-based research generates evidence-informed practice recommendations in the areas of EAP-based CISM intake assessment, organizational consultation and incident response planning.
NASA Astrophysics Data System (ADS)
Sañé, E.; Isla, E.; Grémare, A.; Gutt, J.; Vétion, G.; DeMaster, D. J.
2011-01-01
In March 2002, 3200 km 2 of the Larsen B ice shelf collapsed off the Eastern Antarctic Peninsula (EAP). In the austral summer of 2006, sea floor sediment was recovered beneath the extinct Larsen B ice shelf and in a region off the Northern Antarctic Peninsula (NAP), which has been free of ice shelves for more than 1000 yr. To assess changes in the chemical composition of the sediment after ice shelf collapses, chlorophylls and pheophytins were measured in sediment cores at six stations. This is the first time that chlorophyll pigments have been analysed in sediment samples from regions under recently collapsed ice shelves. Five years after the ice shelf collapse, Chla and Chlc concentrations were similar in the interfacial sediment (upper 1 cm) of NAP and EAP regions. However, in EAP Chla and Chlc concentrations decreased more rapidly with depth in the sediment column and were negligible below 2 cm depth. The high Chla to Pheoa ratios indicated that sedimentary pigments found in EAP had undergone limited degradation suggesting that they were locally produced rather than laterally advected. Complementary information from excess 210Pb activity and diatom valve distributions provided further evidence that the pigment fluxes to the seabed in EAP took place only after the ice shelf collapse.
Binsker, Ulrike; Palankar, Raghavendra; Wesche, Jan; Kohler, Thomas P; Prucha, Josephine; Burchhardt, Gerhard; Rohde, Manfred; Schmidt, Frank; Bröker, Barbara M; Mamat, Uwe; Pané-Farré, Jan; Graf, Anica; Ebner, Patrick; Greinacher, Andreas; Hammerschmidt, Sven
2018-04-01
Staphylococcus aureus can cause bloodstream infections associated with infective endocarditis (IE) and disseminated intravascular coagulopathy (DIC). Both complications involve platelets. In view of an increasing number of antibiotic-resistant strains, new approaches to control systemic S. aureus infection are gaining importance. Using a repertoire of 52 recombinant S. aureus proteins in flow cytometry-based platelet activation and aggregation assays, we identified, in addition to the extracellular adherence protein Eap, three secreted staphylococcal proteins as novel platelet activating proteins. Eap and the chemotaxis inhibitory protein of S. aureus (CHIPS), the formyl peptide receptor-like 1 inhibitory protein (FLIPr) and the major autolysin Atl induced P-selectin expression in washed platelets and platelet-rich plasma. Similarly, AtlA, CHIPS and Eap induced platelet aggregation in whole blood. Fluorescence microscopy illustrated that P-selectin expression is associated with calcium mobilization and re-organization of the platelet actin cytoskeleton. Characterization of the functionally active domains of the major autolysin AtlA and Eap indicates that the amidase domain of Atl and the tandem repeats 3 and 4 of Eap are crucial for platelet activation. These results provide new insights in S. aureus protein interactions with platelets and identify secreted proteins as potential treatment targets in case of antibiotic-resistant S. aureus infection. Schattauer GmbH Stuttgart.
Improvements of Quantum Private Comparison Protocol Based on Cluster States
NASA Astrophysics Data System (ADS)
Zhou, Ming-Kuai
2018-01-01
Quantum private comparison aims to determine whether the secrets from two different users are equal or not by utilizing the laws of quantum mechanics. Recently, Sun and Long put forward a quantum private comparison (QPC) protocol by using four-particle cluster states (Int. J. Theor. Phys. 52, 212-218, 2013). In this paper, we investigate this protocol in depth, and suggest the corresponding improvements. Compared with the original protocol, the improved protocol has the following advantages: 1) it can release the requirements of authenticated classical channels and unitary operations; 2) it can prevent the malicious attack from the genuine semi-honest TP; 3) it can enhance the qubit efficiency.
NASA Astrophysics Data System (ADS)
Vielhauer, Claus; Croce Ferri, Lucilla
2003-06-01
Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo
2017-09-18
Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schernthaner, Ruediger Egbert; Lin, MingDe; Duran, Rafael
PurposeTo evaluate the detectability of intrahepatic cholangiocarcinoma (ICC) on dual-phase cone-beam CT (DPCBCT) during conventional transarterial chemoembolization (cTACE) compared to that of digital subtraction angiography (DSA) with respect to pre-procedure contrast-enhanced magnetic resonance imaging (CE-MRI) of the liver.MethodsThis retrospective study included 17 consecutive patients (10 male, mean age 64) with ICC who underwent pre-procedure CE-MRI of the liver, and DSA and DPCBCT (early-arterial phase (EAP) and delayed-arterial phase (DAP)) just before cTACE. The visibility of each ICC lesion was graded by two radiologists on a three-rank scale (complete, partial, and none) on DPCBCT and DSA images, and then compared tomore » pre-procedure CE-MRI.ResultsOf 61 ICC lesions, only 45.9 % were depicted by DSA, whereas EAP- and DAP-CBCT yielded a significantly higher detectability rate of 73.8 % and 93.4 %, respectively (p < 0.01). Out of the 33 lesions missed on DSA, 18 (54.5 %) and 30 (90.9 %) were revealed on EAP- and DAP-CBCT images, respectively. DSA depicted only one lesion that was missed by DPCBCT due to streak artifacts caused by a prosthetic mitral valve. DAP-CBCT identified significantly more lesions than EAP-CBCT (p < 0.01). Conversely, EAP-CBCT did not detect lesions missed by DAP-CBCT. For complete lesion visibility, DAP-CBCT yielded significantly higher detectability (78.7 %) compared to EAP (31.1 %) and DSA (21.3 %) (p < 0.01).ConclusionDPCBCT, and especially the DAP-CBCT, significantly improved the detectability of ICC lesions during cTACE compared to DSA. We recommend the routine use of DAP-CBCT in patients with ICC for per-procedure detectability and treatment planning in the setting of TACE.« less
NASA Astrophysics Data System (ADS)
Dong, Lin; Grissom, Michael; Fisher, Frank T.
2016-05-01
Vibration-based energy harvesting has been widely investigated to as a means to generate low levels of electrical energy for applications such as wireless sensor networks. However, for optimal performance it is necessary to ensure that resonant frequencies of the device match the ambient vibration frequencies for maximum energy harvested. Here a novel resonant frequency tuning approach is proposed by applying a bias voltage to a pre-stretched electroactive polymer (EAP) membrane, such that the resulting changes in membrane tension can tune the device to match the environmental vibration source. First, a material model which accounts for the change in properties due to the pre-stretch of a VHB 4910 EAP membrane is presented. The effect of the bias voltage on the EAP membrane, which induces an electrostatic pressure and corresponding reduction in membrane thickness, are then determined. The FEM results from ANSYS agree well with an analytical hyperelastic model of the activation response of the EAP membrane. Lastly, through a mass-loaded circular membrane vibration model, the effective resonant frequency of the energy harvester can be determined as a function of changes in membrane tension due to the applied bias voltage. In the case of an EAP membrane, pre-stretch contributes to the pre-stretch stiffness of the system while the applied bias voltage contributes to a change in bias voltage stiffness of the membrane. Preliminary experiments verified the resonant frequencies corresponding to the bias voltages predicted from the appropriate models. The proposed bias voltage tuning approach for the EAP membrane may provide a novel tuning strategy to enable energy harvesting from various ambient vibration sources in various application environments.
Obasaju, Coleman K; Ye, Zhishen; Wozniak, Antoinette J; Belani, Chandra P; Keohan, Mary-Louise; Ross, Helen J; Polikoff, Jonathan A; Mintzer, David M; Monberg, Matthew J; Jänne, Pasi A
2007-02-01
An expanded access program (EAP) provided patient access to pemetrexed prior to its commercial availability. The current report consists of US patients in the EAP who had chemotherapy naïve pleural mesothelioma. Eligible patients had a histologic or cytologic diagnosis of malignant mesothelioma that was not amenable to curative treatment with surgery. Study treatment consisted of pemetrexed 500mg/m(2) in combination with cisplatin 75mg/m(2) once every 21 days. Vitamin B12, folic acid, and dexamethasone were administered as prophylaxis. Serious adverse events (SAEs) were reported by investigators and compiled in a pharmacovigilance database for all patients enrolled in the EAP. Of 1056 patients receiving at least one dose of pemetrexed in the EAP, 728 had chemotherapy naïve pleural mesothelioma. Median age of this group was 70 years (range 23-89 years) and 84% were male. Among 615 patients, overall response rate was 20.5%, including 12 complete responses (2.0%) and 114 partial responses (18.5%). An additional 290 patients (47.2%) had stable disease. Median survival for all 728 patients was 10.8 months (95% CI=9.8, 12.3; 60.3% censorship) and 1 year survival was 45.4%. The most commonly reported SAEs in the overall EAP irrespective of causality were dehydration (7.2%), nausea (5.2%), vomiting (4.9%), dyspnea (3.8%), and pulmonary embolism (2.4%). In this large cohort, 67.7% of patients treated with first-line chemotherapy experienced a response or stable disease. Survival time and toxicity from this EAP were promising for this difficult-to-treat disease.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vavrek, Jayson R.; Henderson, Brian S.; Danagoulian, Areg
Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618–8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal frommore » the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here in this paper we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy “genuine” and “hoax” objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.« less
Vavrek, Jayson R.; Henderson, Brian S.; Danagoulian, Areg
2018-04-10
Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618–8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal frommore » the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here in this paper we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy “genuine” and “hoax” objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.« less
Client-Centered Employee Assistance Services.
ERIC Educational Resources Information Center
Bayer, Darryl Lee
This paper addresses delivery aspects and benefits of client-centered Employee Assistance Program (EAP) services through a review of the literature and research. EAP services are described as educational and mental health services utilized to assist employees and their families to respond constructively to job, personal, interpersonal or…
Modelling electro-active polymers with a dispersion-type anisotropy
NASA Astrophysics Data System (ADS)
Hossain, Mokarram; Steinmann, Paul
2018-02-01
We propose a novel constitutive framework for electro-active polymers (EAPs) that can take into account anisotropy with a chain dispersion. To enhance actuation behaviour, particle-filled EAPs become promising candidates nowadays. Recent studies suggest that particle-filled EAPs, which can be cured under an electric field during the manufacturing time, do not necessarily form perfect anisotropic composites, rather they create composites with dispersed chains. Hence in this contribution, an electro-mechanically coupled constitutive model is devised that considers the chain dispersion with a probability distribution function in an integral form. To obtain relevant quantities in discrete form, numerical integration over the unit sphere is utilized. Necessary constitutive equations are derived exploiting the basic laws of thermodynamics that result in a thermodynamically consistent formulation. To demonstrate the performance of the proposed electro-mechanically coupled framework, we analytically solve a non-homogeneous boundary value problem, the extension and inflation of an axisymmetric cylindrical tube under electro-mechanically coupled load. The results capture various electro-mechanical couplings with the formulation proposed for EAP composites.
Colantonio, A
1989-01-01
Employee assistance programs have grown at a dramatic rate, yet the effectiveness of these programs has been called into question. The purpose of this paper was to assess the effectiveness of employee assistance programs (EAPs) by reviewing recently published EAP evaluations. All studies evaluating EAPs published since 1975 from peer-reviewed journals in the English language were included in this analysis. Each of the articles was assessed in the following areas: (a) program description (subjects, setting, type of intervention, format), (b) evaluation design (research design, variables measured, operational methods), and (c) program outcomes. Results indicate numerous methodological and conceptual weaknesses and issues. These weaknesses included lack of controlled research designs and short time lags between pre- and post-test measures. Other problems identified are missing information regarding subjects, type of intervention, how variables are measured (operational methods), and reliability and validity of evaluation instruments. Due to the aforementioned weaknesses, positive outcomes could not be supported. Recommendations are made for future EAP evaluations.
Synergism in work site adoption of employee assistance programs and health promotion activities.
Blum, T C; Roman, P M; Patrick, L
1990-05-01
As workplaces increasingly adopt proactive programs directed toward employee health issues, the interrelation between different programs becomes an important issue. Of interest here is the "synergy" in patterns of program adoption between employee assistance programs (EAPs) and health promotion activities (HPAs). We utilize the 1985 National Survey of Worksite Health Promotion Activities (N = 1358) for analyses of the dual presence of EAPs and HPAs, and in multivariate analyses we consider factors affecting such dual presence. The data suggest that synergy occurs, with EAP adoption appearing to influence HPA adoption to a greater extent than the reverse. In multivariate analyses, synergy is confirmed by the finding that, among a variety of relevant organizational characteristics, EAP presence and HPA presence are the best predictors of each other's presence. The analyses also indicate that there is minimal commonality in program ingredients across organizations reporting the presence of HPAs. Implications of the data for the future development of these two programming strategies are discussed.
Colantonio, A.
1989-01-01
Employee assistance programs have grown at a dramatic rate, yet the effectiveness of these programs has been called into question. The purpose of this paper was to assess the effectiveness of employee assistance programs (EAPs) by reviewing recently published EAP evaluations. All studies evaluating EAPs published since 1975 from peer-reviewed journals in the English language were included in this analysis. Each of the articles was assessed in the following areas: (a) program description (subjects, setting, type of intervention, format), (b) evaluation design (research design, variables measured, operational methods), and (c) program outcomes. Results indicate numerous methodological and conceptual weaknesses and issues. These weaknesses included lack of controlled research designs and short time lags between pre- and post-test measures. Other problems identified are missing information regarding subjects, type of intervention, how variables are measured (operational methods), and reliability and validity of evaluation instruments. Due to the aforementioned weaknesses, positive outcomes could not be supported. Recommendations are made for future EAP evaluations. PMID:2728498
NASA Astrophysics Data System (ADS)
Sañé, E.; Isla, E.; Pruski, A. M.; Bárcena, M. A.; Vétion, G.; DeMaster, D.
2011-08-01
During austral summer 2006-2007, five sediment cores were recovered from the Eastern Antarctic Peninsula (EAP) continental shelf. Microscopic observations and sediment fatty acid (FA) composition analyses were carried out to investigate whether the drastic changes at the sea surface in EAP may be reflected in the sedimentary record. A sharp decrease in the number of diatom valves was observed below 2 cm depth. This difference between the upper 2 cm of sediment and the deeper part of the sediment column was attributed to the drastic change in the upper water column conditions after the collapse of the ice shelves, which allowed the arrival of phytoplankton debris and fresh organic matter to the sea floor in EAP. The presence of bacterial-, zooplankton- and detrital-related FA throughout EAP cores suggests that there has been an input of older and more refractory organic matter into the region, presumably by lateral transport before the Larsen ice shelves disintegration.
Two RFID standard-based security protocols for healthcare environments.
Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E
2013-10-01
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
NASA Astrophysics Data System (ADS)
Naik, R. Lalu; Reddy, P. Chenna
2015-12-01
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan
2018-03-02
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function
Ding, Jie; Zhu, Feng; Wang, Ruchuan
2018-01-01
With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security. PMID:29498684
Anisotropic D-EAP Electrodes and their Application in Spring Roll Actuators
NASA Astrophysics Data System (ADS)
Fang, Xiaomeng
Electroactive polymers (EAPs) exhibit shape change when subjected to an electric field. They are lightweight, soft, and inexpensive, while they are easy to process, shape, and tune to offer a broad range of mechanical and electrical properties. Dielectric electroactive polymers (DEAP) constitute a class of EAPs with great potential. D-EAPs consist of physically or chemically cross-linked macromolecular networks and are mechanically isotopic. Therefore, in most actuator applications that require directional electromechanical response, it is necessary to use other complex means to direct the stress/strain in the preferred direction. In this work, a simple carbon nanotube (CNT) based electrode for D-EAP actuators is demonstrated that vastly improves directional strain response originating from the mechanical anisotropy of the electrode material. Using this novel approach, the mechanical anisotropy, defined as the ratio of initial modulus in fiber direction and that in cross-fiber direction, of the CNT electroded VHB actuators, ranges from 7.9 to 11.2. Hence, the CNT-VHB flat film actuators show high directed linear actuation strain in cross-fiber direction of greater than 25% meanwhile almost no strain in fiber direction at a relatively low electric field (120 V mum-1). The morphology of the CNT sheets has critical influence on their mechanical properties and resultant actuator performance. The results demonstrate the efficacy of microcombing and selective laser etching processes to improve the CNT fiber alignment to produce pure unidirectional strain of 33% at a relatively moderate electric field. Unidirectional D-EAP composite laminates using polyurethane and polyamide monofilaments are also employed in spring roll actuators to investigate their directional mechanical and electromechanical properties. While CNT electroded D-EAP spring roll actuators were found to have about the same performance as actuators with carbon grease electrodes (6.5% strain in CNT electroded spring roll actuators and 8.2% for carbon grease electroded actuators at 5kV), spring roll actuator made of fiber reinforced VHB composites with carbon grease electrodes showed marginal improvement in actuation strain (9.9%-11% strain in longitudinal direction at 5kV).
Addressing the Tension Between Strong Perimeter Control an Usability
NASA Technical Reports Server (NTRS)
Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris
2006-01-01
This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.
Refreshable Braille displays using EAP actuators
NASA Astrophysics Data System (ADS)
Bar-Cohen, Yoseph
2010-04-01
Refreshable Braille can help visually impaired persons benefit from the growing advances in computer technology. The development of such displays in a full screen form is a great challenge due to the need to pack many actuators in small area without interferences. In recent years, various displays using actuators such as piezoelectric stacks have become available in commercial form but most of them are limited to one line Braille code. Researchers in the field of electroactive polymers (EAP) investigated methods of using these materials to form full screen displays. This manuscript reviews the state of the art of producing refreshable Braille displays using EAP-based actuators.
Refreshable Braille Displays Using EAP Actuators
NASA Technical Reports Server (NTRS)
Bar-Cohen, Yoseph
2010-01-01
Refreshable Braille can help visually impaired persons benefit from the growing advances in computer technology. The development of such displays in a full screen form is a great challenge due to the need to pack many actuators in small area without interferences. In recent years, various displays using actuators such as piezoelectric stacks have become available in commercial form but most of them are limited to one line Braille code. Researchers in the field of electroactive polymers (EAP) investigated methods of using these materials to form full screen displays. This manuscript reviews the state of the art of producing refreshable Braille displays using EAP-based actuators..
Macdonald, S; Albert, W; Maynard, M; French, P
1989-02-01
This study examined characteristics of referrals to employee assistance programs (EAP) associated with subsequent termination of employment. As well, relationships between characteristics of the referrals and program characteristics were explored. Longitudinal data were collected at several time periods for 163 referrals to EAPs from five organizations. Survival analysis was conducted to determine which variables were associated with termination of employment. Females, cohabitating couples, and employees who worked for the organization for 5 or more years were most likely to remain employed. One interesting finding was that people with alcohol problems were significantly more likely to be formal referrals.
Extended Nonfiction Readers for EAP Programs
ERIC Educational Resources Information Center
Fitzsimmons-Doolan, Shannon; Davis, Jessica; Stoller, Fredricka L.; Crawford, William
2012-01-01
Content-based instruction course designers have many important decisions to make when developing courses for postsecondary English for academic purposes (EAP) students. One important consideration revolves around deciding if students would benefit most from the use of sustained content (Murphy & Stoller, 2001) or a topical approach (Brinton,…
ERIC Educational Resources Information Center
Quick, R. C.; And Others
1987-01-01
Outlines Cornell University's Employee Assistance Education and Research Program, which uses an academic curriculum and field experience to further develop the Employee Assistance Program (EAP) profession. Addresses the dilemma of personnel executives in ensuring quality in EAP programs and staff. (JOW)
Grief and Horses: Putting the Pieces Together
ERIC Educational Resources Information Center
Symington, Ashley
2012-01-01
The effectiveness of grief counseling may be enhanced through the utilization of equine-assisted psychotherapy (EAP). An experiential, solution-focused, and natural approach, EAP provides clients with the opportunity to discover solutions to challenges that exist within themselves. Counselors and equine specialists team with horses to provide a…
Extracting quantitative measures from EAP: a small clinical study using BFOR.
Hosseinbor, A Pasha; Chung, Moo K; Wu, Yu-Chien; Fleming, John O; Field, Aaron S; Alexander, Andrew L
2012-01-01
The ensemble average propagator (EAP) describes the 3D average diffusion process of water molecules, capturing both its radial and angular contents, and hence providing rich information about complex tissue microstructure properties. Bessel Fourier orientation reconstruction (BFOR) is one of several analytical, non-Cartesian EAP reconstruction schemes employing multiple shell acquisitions that have recently been proposed. Such modeling bases have not yet been fully exploited in the extraction of rotationally invariant q-space indices that describe the degree of diffusion anisotropy/restrictivity. Such quantitative measures include the zero-displacement probability (P(o)), mean squared displacement (MSD), q-space inverse variance (QIV), and generalized fractional anisotropy (GFA), and all are simply scalar features of the EAP. In this study, a general relationship between MSD and q-space diffusion signal is derived and an EAP-based definition of GFA is introduced. A significant part of the paper is dedicated to utilizing BFOR in a clinical dataset, comprised of 5 multiple sclerosis (MS) patients and 4 healthy controls, to estimate P(o), MSD, QIV, and GFA of corpus callosum, and specifically, to see if such indices can detect changes between normal appearing white matter (NAWM) and healthy white matter (WM). Although the sample size is small, this study is a proof of concept that can be extended to larger sample sizes in the future.
Wang, X-J; Xia, L-L; Xu, T-Y; Zhang, X-H; Zhu, Z-W; Zhang, M-G; Liu, Y; Xu, C; Zhong, S; Shen, Z-J
2016-04-01
There is a growing recognition of the association between chronic prostatitis/chronic pelvic pain syndrome (CP/CPPS) and erectile dysfunction (ED); however, most of the reports are based on questionnaires which cannot distinguish between organic and functional ED. The purpose of this study was to determine the exact relationship between CP/CPPS and ED, and to investigate the changes in erectile organ structure and function in a rat model of CP/CPPS. We established a rat model of experimental autoimmune prostatitis (EAP), which is a valid model for CP/CPPS. Erectile function in EAP and normal rats was comparable after cavernous nerve electrostimulation. The serum testosterone and oestradiol levels, ultrastructure of the corpus cavernosum and expression of endothelial nitric oxide synthase and neuronal nitric oxide synthase in the two groups were similar; however, there was a decrease in smooth muscle-to-collagen ratio and alpha-smooth muscle actin expression and an increase in transforming growth factor-beta 1 expression was observed in EAP rats. Thus, organic ED may not exist in EAP rats. We speculate that ED complained by patients with CP/CPPS may be psychological, which could be caused by impairment in the quality of life; however, further studies are needed to fully understand the potential mechanisms underlying the penile fibrosis in EAP rats. © 2015 Blackwell Verlag GmbH.
Overview of NASA Electrified Aircraft Propulsion Research for Large Subsonic Transports
NASA Technical Reports Server (NTRS)
Jansen, Ralph H.; Bowman, Cheryl; Jankovsky, Amy; Dyson, Rodger; Felder, James L.
2017-01-01
NASA is investing in Electrified Aircraft Propulsion (EAP) research as part of the portfolio to improve the fuel efficiency, emissions, and noise levels in commercial transport aircraft. Turboelectric, partially turboelectric, and hybrid electric propulsion systems are the primary EAP configurations being evaluated for regional jet and larger aircraft. The goal is to show that one or more viable EAP concepts exist for narrow body aircraft and mature tall-pole technologies related to those concepts. A summary of the aircraft system studies, technology development, and facility development is provided. The leading concept for mid-term (2035) introduction of EAP for a single aisle aircraft is a tube and wing, partially turbo electric configuration (STARC-ABL), however other viable configurations exist. Investments are being made to raise the TRL (Technology Readiness Level) level of light weight, high efficiency motors, generators, and electrical power distribution systems as well as to define the optimal turbine and boundary layer ingestion systems for a mid-term tube and wing configuration. An electric aircraft power system test facility (NEAT - NASA’s Electric Aircraft Testbed) is under construction at NASA Glenn and an electric aircraft control system test facility (HEIST - Hybrid-Electric Integrated Systems Testbed) is under construction at NASA Armstrong. The correct building blocks are in place to have a viable, large plane EAP configuration tested by 2025 leading to entry into service in 2035 if the community chooses to pursue that goal.
Overview of NASA Electrified Aircraft Propulsion Research for Large Subsonic Transports
NASA Technical Reports Server (NTRS)
Jansen, Ralph H.; Bowman, Cheryl; Jankovsky, Amy; Dyson, Rodger; Felder, James L.
2017-01-01
NASA is investing in Electrified Aircraft Propulsion (EAP) research as part of the portfolio to improve the fuel efficiency, emissions, and noise levels in commercial transport aircraft. Turboelectric, partially turboelectric, and hybrid electric propulsion systems are the primary EAP configurations being evaluated for regional jet and larger aircraft. The goal is to show that one or more viable EAP concepts exist for narrow body aircraft and mature tall-pole technologies related to those concepts. A summary of the aircraft system studies, technology development, and facility development is provided. The leading concept for mid-term (2035) introduction of EAP for a single aisle aircraft is a tube and wing, partially turbo electric configuration (STARC-ABL), however other viable configurations exist. Investments are being made to raise the TRL level of light weight, high efficiency motors, generators, and electrical power distribution systems as well as to define the optimal turbine and boundary layer ingestion systems for a mid-term tube and wing configuration. An electric aircraft power system test facility (NEAT) is under construction at NASA Glenn and an electric aircraft control system test facility (HEIST) is under construction at NASA Armstrong. The correct building blocks are in place to have a viable, large plane EAP configuration tested by 2025 leading to entry into service in 2035 if the community chooses to pursue that goal.
Effects of EAP follow-up on prevention of relapse among substance abuse clients.
Foote, A; Erfurt, J C
1991-05-01
Clients entering an employee assistance program (EAP) of a large manufacturing plant in 1985 who were assessed as having an alcohol or drug abuse problem (N = 325) were randomized into an experimental "special follow-up" group and a control "regular care" group. The regular care group received follow-up only as needed (following the usual practice of the EAP), while a follow-up counselor was hired to make routine contacts with the special follow-up group. Study intake continued through 1985, and follow-up continued through the end of 1986. Data collected on study subjects included EAP participation data, absenteeism, number of hospitalizations, health care claims paid and disability claims paid. The major study hypothesis was that EAP clients randomly allocated to special follow-up would show better results than regular care clients (i.e., would have fewer relapses, better job attendance and lower health benefit utilization during the follow-up year). The follow-up intervention was incompletely implemented due to a variety of organizational problems. Differences between the two groups on the six outcome measures were not statistically significant, although clients in the special follow-up group did show better results than clients in the regular care group on the three measures related to substance abuse. Differences on these three measures were marginally significant in regression analyses after controlling for the effects of number of follow-up visits, age, race and chronicity.
The possible physical mechanism for the EAP-SR co-action
NASA Astrophysics Data System (ADS)
Gong, Zhiqiang; Feng, Guolin; Dogar, Muhammad Mubashar; Huang, Gang
2017-11-01
The anomalous characteristics of summer precipitation and atmospheric circulation in the East Asia-West Pacific Region (EA-WP) associated with the co-action of East Asia/Pacific teleconnection-Silk Road teleconnection (EAP-SR) are investigated in this study. The compositions of EAP-SR phase anomalies can be expressed as pattern I (+ +), pattern II (+ -), pattern III (- -), and pattern IV (- +) using EAP and SR indices. It is found that the spatial distribution of summer precipitation anomalies in EA-WP corresponding to pattern I (III) shows a tripole structure in the meridional direction and a zonal dipole structure in the subtropical region, while pattern II (IV) presents a tripole pattern in meridional direction with compressed and continuous anomalies in the zonal direction over the subtropical region. The similar meridional and zonal structures are also found in the geopotential height anomalies at 500-hPa, as well as wind anomalies and moisture convergence at 850-hPa. Finally, a schematic mechanism for the EAP-SR co-action upon the summer precipitation in EA-WP is built: (1) Pattern I (III) exhibits that the negative (positive) sea surface temperature (SST) anomalies over tropical East Pacific may cause the enhanced (weakened) convective activity dominating the West Pacific, trigger the positive (negative) EAP teleconnection and produce more (less) precipitation. Besides, the negative (positive) SST anomalies over the Indonesia Maritime Continent (IMC) may further weaken (strengthen) anomalous downward (upward) motion over the South China Sea (SCS), cause negative (positive) geopotential height anomalies at the middle troposphere and surrounding regions through the function of the tropical Hadley circulation. Then the negative (positive) geopotential height anomalies could motivate the positive (negative) EAP teleconnection through the northward propagation of wave-activity perturbation. Meanwhile, a positive (negative) geopotential height anomalous pattern over Eastern Europe motivates a Rossby wave train propagation from Western Europe to west-central Asia. This circumstance can cause suppressed (enhanced) convection and less (more) precipitation over northwestern India and Pakistan, which could strengthen the negative (positive) geopotential height and positive (negative) vorticity anomalies over central East Asia, resulting in a negative (positive) SR teleconnection along the Asian jet stream. A positive (negative) lobe over the Korean Peninsula and Japan corresponding to SR overlaps with a positive (negative) lobe of EAP, which strengthens the anomalous phase contrast on both sides of 120°E. Accordingly, summer precipitation anomalies in EA-WP exhibit the meridional tripole pattern and the zonal dipole pattern. (2) Pattern II (IV) indicates that the normal SST anomalies over the tropical East Pacific cause the weak tele-impact on the tropical West Pacific, while the positive (negative) SST anomalies over the IMC will lead to a negative (positive) lobe of EAP over the subtropical region. This circumstance can weaken the positive (negative) lobe of SR over subtropical region, causing compressed and continuous negative (positive) anomalies of 500-hPa geopotential height and positive (negative) surface precipitation anomalies from central East China to Japan.
A Secure Mobile-Based Authentication System for e-Banking
NASA Astrophysics Data System (ADS)
Rifà-Pous, Helena
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
First Time Authentication for Airborne Networks (FAAN)
2010-01-01
21] “An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations”, D Chaum , J-H Evertse, J van de Graaf...System Sciences, p. 1-9, 1998. [5] D . Micciancio, The Shortest Vector in a Lattice is Hard to Approximate to within Some Constant, Proc. 39th...1999. [7] D . Micciancio and E. Petrank, Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol, Proceedings of Advances in
Developing School Connectedness among Diverse Youth through Extracurricular Programming
ERIC Educational Resources Information Center
Brown, Randall; Evans, William P.
2005-01-01
Extracurricular activity participation (EAP) is a formalized opportunity for youth to experience non-classroom-based, prosocial programming. A considerable amount of research, using both cross-sectional and longitudinal samples, has found important relationships between EAP and a decreased likelihood of dropping out and substance use, as well as…
Impaired Job Performance and Critical Incidents: Factors Influencing Supervisory EAP Referrals.
ERIC Educational Resources Information Center
Harley, David A.
Relatively little empirical research has been done on the supervisory referral of employees to employee assistance programs (EAPs). Inclusion of constructive confrontation (supervisory referral) into program standards and its continued promotion as a "central strategy" of program theory and operation calls for critical investigation of…
The Margins as "Third Space": EAP Teacher Professionalism in Canadian Universities
ERIC Educational Resources Information Center
MacDonald, Jennifer
2016-01-01
Teachers of English for Academic Purposes (EAP) in the Canadian university setting often experience professional marginalization in terms of lack of status, clarity of mandate, or administrative home within their institutions. Despite having broadly benefited the ESL/EAL sector in Canada, traditional trait-focused professionalization efforts have…
Emergency Action Plans in Physical Education
ERIC Educational Resources Information Center
Tanis, Cindy J.; Hebel, Susan L.
2016-01-01
Emergency Action Plans (EAP) are essential to properly manage injuries and illnesses in physical education and sport. However, most literature discusses EAP's in the athletic arena instead of physical education. The purpose of this study was to examine physical education instructors' experiences of student illness and injury, discuss the steps of…
Simulation/Gaming in the EAP Writing Class: Benefits and Drawbacks.
ERIC Educational Resources Information Center
Salies, Tania Gastao
2002-01-01
Describes an integrated use of simulation/gaming in an English for Academic Purposes (EAP) class, analyzes benefits and drawbacks, and suggest how the technique could apply to other specific contexts. Explains how international students ran a simulation on gun control; discusses the debriefing process; and considers motivation, metacognitive…
EAP Curriculum Alignment and Social Acculturation: Student Perceptions
ERIC Educational Resources Information Center
Tweedie, M. Gregory; Kim, Marcia
2015-01-01
The role of English as a second language (ESL) teachers and instruction as factors in student social and psychological acculturation is widely acknowledged. However, the function of English for Academic Purposes (EAP) is less well known in this regard, because research has focused largely on academic acculturation. This qualitative study…
Reading and Writing as Academic Literacy in EAP Program of Indonesian Leaners
ERIC Educational Resources Information Center
Solikhah, Imroatus
2015-01-01
This study investigates academic literacy imposed in reading and writing for academic purposes in the EAP program. This study uses descriptive design elaborating data from curriculum documents and interviews. Involving 45 participants from IAIN Surakarta and Veteran University, data were analyzed using constant-comparison and inductive analysis…
Eliciting Production of L2 Target Structures through Priming Activities
ERIC Educational Resources Information Center
McDonough, Kim; Trofimovich, Pavel; Neumann, Heike
2015-01-01
This study focuses on the pedagogical applications of structural priming research in an English for academic purposes (EAP) context, investigating whether priming activities are an effective tool for eliciting production of target grammatical structures. University students across four EAP classes carried out a total of 6 information-exchange…
Receptivity to Learner-Driven Feedback in EAP
ERIC Educational Resources Information Center
Maas, Clare
2017-01-01
There is still debate surrounding what constitutes the most effective feedback on EFL learners' writing, particularly in English for Academic Purposes (EAP) settings. Unanswered questions are found in the literature on topics such as the best formats for feedback, the role of technology, authors' authority over written texts, and ways of helping…
2014-02-01
English for academic purposes ( EAP ) instructors at the United States Air Force Academy encounter a variety of challenges presented by the diverse...linguistic and cultural backgrounds of the international cadets. There are currently 57 international cadets from 29 countries who are required to take the EAP course along with their core courses during their freshman year.
Preparing Marriage and Family Therapy Students to Become Employee Assistance Professionals.
ERIC Educational Resources Information Center
Smith, Thomas A., Jr.; And Others
1989-01-01
Addresses issues pertinent to training Marriage and Family Therapy (MFT) students to develop the skills needed to become Employee Assistance Programs (EAP) professionals. Describes qualifications for becoming EAP professional. Suggests how skills may be taught within the framework of an academically based MFT training program. (Author/ABL)
Planning, Implementing, and Documenting an Innovative Statewide Occupational Initiative.
ERIC Educational Resources Information Center
Floyd, Jerald D.
During an 18-month demonstration period, the Illinois Occupational Program Initiative (IOPI), funded through the state's Division of Alcoholism, demonstrated the feasibility of funding individual contractors to create and market employee assistance programs (EAPs) to representatives of industry and labor. Cost estimates for the EAPs were to cover…
Employee Assistance Programmes: The Emperor's New Clothes of Stress Management?
ERIC Educational Resources Information Center
Arthur, Andrew R.
2000-01-01
Discusses the employee assistance program (EAP), a benefit increasingly provided by United Kingdom employers that claims to reduce the effects of stress on individuals and organizations, provide a management tool to improve workplace performance and productivity, and respond to critical incidents. Describes EAPs, their history, development and…
Counterfactual quantum certificate authorization
NASA Astrophysics Data System (ADS)
Shenoy H., Akshata; Srikanth, R.; Srinivas, T.
2014-05-01
We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.
A hash based mutual RFID tag authentication protocol in telecare medicine information system.
Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C
2015-01-01
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
NASA Astrophysics Data System (ADS)
Gallagher, J. H. R.; Potter, N.; Evans, B. J. K.
2016-12-01
OPeNDAP, in conjunction with the Australian National University, documented the installation process needed to add authentication to OPeNDAP-enabled data servers (Hyrax, TDS, etc.) and examined 13 OPeNDAP clients to determine how best to add authentication using LDAP, Shibboleth and OAuth2 (we used NASA's URS). We settled on a server configuration (architecture) that uses the Apache web server and a collection of open-source modules to perform the authentication and authorization actions. This is not the only way to accomplish those goals, but using Apache represents a good balance between functionality, leveraging existing work that has been well vetted and includes support for a wide variety of web services, include those that depend on a servlet engine such as tomcat (which both Hyrax and TDS do). Or work shows how LDAP, OAuth2 and Shibboleth can all be accommodated using this readily available software stack. Also important is that the Apache software is very widely used and is fairly robust - extremely important for security software components. In order to make use of a server requiring authentication, clients must support the authentication process. Because HTTP has included authentication for well over a decade, and because HTTP/HTTPS can be used by simply linking programs with a library, both the LDAP and OAuth2/URS authentication schemes have almost universal support within the OPeNDAP client base. The clients, i.e. the HTTP client libraries they employ, understand how to submit the credentials to the correct server when confronted by an HTTP/S Unauthorized (401) response. Interestingly OAuth2 can achieve it's SSO objectives while relying entirely on normative HTTP transport. All 13 of the clients examined worked.The situation with Shibboleth is different. While Shibboleth does use HTTP, it also requires the client to either scrape a web page or support the SAML2.0 ECP profile, which, for programmatic clients, means using SOAP messages. Since working with SOAP is outside the scope of HTTP, support for Shibboleth must be added explicitly into the client software. Some of the potential burden of enabling OPeNDAP clients to work with Shibboleth may be mitigated by getting both NetCDF-C and NetCDF-Java libraries to use the Shibboleth ECP profile. If done, this would get 9 of the 13 clients we examined working.
ERIC Educational Resources Information Center
Ghafournia, Narjes
2014-01-01
This study scrutinized the relationship between utilizing language-learning strategies and university levels in reading-comprehension process of language learners in Iran. The participants comprised 406 EAP students at three university levels. The findings reflected significant differences among the students in implementing learning strategies.…
Enhancing the Quality of EAP Writing through Overt Teaching
ERIC Educational Resources Information Center
Wee, Roselind; Sim, Jacqueline; Jusoff, Kamaruzaman
2009-01-01
This paper examines how overt teaching is instrumental in reducing subject-verb agreement (SVA) errors of Malaysian EAP learners which in turn improves the quality of their writing. The researchers used overt teaching of these grammatical items, that is, SVA and investigated how this method has significantly benefitted the learners who were second…
A Study of Culturally Responsive Teaching Practices of Adult ESOL and EAP Teachers
ERIC Educational Resources Information Center
Rhodes, Christy M.
2013-01-01
The purpose of this study was to examine how frequently adult education English for Speakers of Other Languages (ESOL) and English for Academic Purposes (EAP) teachers in Florida used specific culturally responsive teaching practices and how important they believed those practices were to their teaching. Using Ginsberg and Wlodkowski's…
A New Outlook on EAP Literacies: General and Specific English Territories
ERIC Educational Resources Information Center
Zohrabi, Mohammad
2010-01-01
In designing an EAP (English for Academic Purposes) course it is necessary that we consider several factors: students' objectives, needs, levels and interests, course and institution's goals, and availability of resources. In this paper it is strived to elucidate the differences between EGP (English for General purposes) and ESP (English for…
A Pilot Validation Study of the Early Assessment Program English Examination
ERIC Educational Resources Information Center
White, Michael Anthony
2013-01-01
The purpose of this study was to determine whether results on the English Early Assessment Program (EAP) examination predict college-level English success. Previous research indicates a relationship between EAP college-prepared status and academic achievement. The present study is unique, in that student-level community college English grades were…
Diagnosing EAP Writing Ability Using the Reduced Reparameterized Unified Model
ERIC Educational Resources Information Center
Kim, Youn-Hee
2011-01-01
Despite the increasing interest in and need for test information for use in instructional practice and student learning, there have been few attempts to systematically link a diagnostic approach to English for academic purposes (EAP) writing instruction and assessment. In response to this need for research, this study examined the extent to which…
Employment and Roles of Counselors in Employee Assistance Programs.
ERIC Educational Resources Information Center
Hosie, Thomas W.; And Others
1993-01-01
Studied employment and roles of master's-level counselors in employee assistance programs (EAPs). Counselors were found to be similar to those with Master's of Social Work degrees in employment rate and percentage of EAP staff. Both groups were most frequently employed and constituted greatest percentage of professional mental health staff in…
Impact of Employee Assistance Programs on Substance Abusers and Workplace Safety
ERIC Educational Resources Information Center
Elliott, Karen; Shelley, Kyna
2005-01-01
Businesses have dealt with substance abuse in different ways. Some organizations have established Employee Assistance Programs (EAPs) to address these problems. One large national company chose to fire employees with positive drug screens, offer them EAP services, and then consider them for rehire after treatment. A study of performance records…
An Evaluation of the Employee Assistance Program in the Montgomery County Public School System.
ERIC Educational Resources Information Center
Goldberg, Jo Ann
The Montgomery County public school system presently provides assistance through the Employee Assistance Program (EAP) to troubled employees with problems which affect work performance. EAP's mandate is to provide crisis intervention, prereferral evaluation, information, referral, and follow-up services. From its inception to March, 1981, EAP…
An Overview of Occupational Alcoholism Issues for the 80's.
ERIC Educational Resources Information Center
McClellan, Keith
1982-01-01
Analyzes the past decade as a period of learning and experimentation in occupational alcoholism and employee assistance programming (EAPs). Suggests future EAPs will place less emphasis on supervisory confrontation than on broader types of casefinding; and early identification, prior to a decline in job performance, will take place. (Author/RC)
Teaching the Vocabulary of Citation: Action Research in a Southeast Asian Context
ERIC Educational Resources Information Center
Lynch, Jena
2016-01-01
This action research project sought to investigate the role of explicit citation vocabulary instruction in the learning of citation style guidelines for an English for Academic Purposes (EAP) writing course at an English-medium university in Northern Thailand. The participants consisted of 120 undergraduate students enrolled in the EAP writing…