Management Techniques

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 540057 Experts worldwide ranked by ideXlab platform

Marko Horvat - One of the best experts on this subject based on the ideXlab platform.

  • improving the iso iec 11770 standard for key Management Techniques
    2016
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

  • improving the iso iec 11770 standard for key Management Techniques
    2016
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

  • improving the iso iec 11770 standard for key Management Techniques
    2014
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques [18,19], which describes a set of key exchange, key authentication, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

  • improving the iso iec 11770 standard for key Management Techniques
    2014
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques [18,19], which describes a set of key exchange, key authentication, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

Cas Cremers - One of the best experts on this subject based on the ideXlab platform.

  • improving the iso iec 11770 standard for key Management Techniques
    2016
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

  • improving the iso iec 11770 standard for key Management Techniques
    2016
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

  • improving the iso iec 11770 standard for key Management Techniques
    2014
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques [18,19], which describes a set of key exchange, key authentication, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

  • improving the iso iec 11770 standard for key Management Techniques
    2014
    Co-Authors: Cas Cremers, Marko Horvat
    Abstract:

    We provide the first systematic analysis of the ISO/IEC 11770 standard for key Management Techniques [18,19], which describes a set of key exchange, key authentication, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key Management protocols, for 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.

Jennifer Widom - One of the best experts on this subject based on the ideXlab platform.

  • efficient and flexible location Management Techniques for wireless communication systems
    1996
    Co-Authors: Jan Jannink, Narayanan Shnivakumar, Jennifer Widom
    Abstract:

    We consider the problem of managing the information required to locate users in a wireless communication system, with a focus on designing and evaluating location Management Techniques that are efficient, scalable, and flexible. The three key contributions of this paper are: (1) a family of location Management Techniques, HiPER (for Hierarchical ProfilE Replication), that efficiently provide life‐long (non‐geographic) numbering with fast location lookup; (2) Pleiades, a scalable event‐driven wireless system simulator with realistic calling and mobility patterns derived from several months of real traffic traces; and (3) multi‐day simulations comparing our proposed location Management Techniques with current and previously proposed Techniques on a realistic geographical and network topology.

Jan Van Zundert - One of the best experts on this subject based on the ideXlab platform.

  • clinical research in interventional pain Management Techniques the clinician s point of view
    2007
    Co-Authors: Jan Van Zundert
    Abstract:

    :  Interventional pain Management Techniques are considered for patients whose pain proves refractory to conventional treatment. According to the evidence-based medicine (EBM) guidelines, the highest level of evidence for efficacy and safety of a treatment is generated in high-quality randomized controlled trials and systematic reviews. A randomized controlled trial is defined as an experiment that determines the influence of an intervention on the natural history of the disease, which means that the comparative group should receive placebo, which is a sham intervention in case of the interventional pain Management Techniques. The systematic review summarizes in a structured way the results of the available information. When randomized controlled trials are available, observational studies will often be discarded. As new information on a treatment becomes available the perceived value may change, thus determining the survival time of clinical evidence. This survival time is not different when based on randomized or nonrandomized studies. The inclusion criteria are an important component of the randomized controlled trial and are designed to test a treatment in a homogeneous patient population. As interventional pain Management Techniques are mainly used for the Management of spinal pain, it needs to be stressed that there is no gold standard for the diagnosis. This lack of validated standard diagnostic procedures is at the origin of different patient selection criteria, which makes the interpretation of the different randomized controlled trials and the meta-analyses very difficult. Moreover, the extrapolation of randomized controlled trials with carefully selected patient populations to daily practice is a major problem. Randomized controlled trials in interventional pain Management Techniques often prove to be underpowered, which can be attributed to the difficulty in motivating patients and the referring physicians to participate in a trial where there is 50% chance of receiving a placebo/sham for intractable pain. Furthermore, the validity of sham intervention as a reflection of the natural course of the disease is questioned. It is stated that any new technique should prove to be at least equally effective as the best available treatment option, which offers the possibility of comparing two groups, both receiving active treatment. The reference treatment may be pharmacological or a rehabilitation program (cognitive behavioral) in which case blinding becomes a problem. It has been demonstrated that large observational studies with a cohort or case–control design do not systematically overestimate the magnitude of the associations between exposure and outcome as compared with the results of randomized controlled trials. There is an urgent need for guidelines on performing prospective cohort trials that should be designed to confirm or refute the anecdotal findings from retrospective studies.

Yuchiao Chang - One of the best experts on this subject based on the ideXlab platform.

  • Peri-procedural protocols for interventional pain Management Techniques: a survey of US pain centers.
    2005
    Co-Authors: Shihab U Ahmed, William Tonidandel, Nicole M Martin, Jason Trella, Yuchiao Chang
    Abstract:

    BACKGROUND: Interventional Techniques are now an integral part of chronic pain Management. As new procedures are arising at a rapid pace, decisions regarding patient safety and comfort are becoming more challenging. No peri-procedural consensus protocol currently addresses issues such as 1. nulla per os (NPO) status, 2. sedation, 3. monitoring, or 4. recovery. In establishing safety guidelines for interventional pain procedures, the knowledge of current peri-procedural protocols is required. OBJECTIVE: To survey interventional pain practices and to obtain current peri-procedural protocols. DESIGN: We faxed a one-page questionnaire to 105 United States pain practices identified using the directory of the American Pain Society. Fifty-seven academic and private pain practices (54%) responded and were included in the analysis. RESULTS: Monitoring devices such as electrocardiogram (EKG), blood pressure, and pulse oximetry are not universally employed for cervical or lumbar spinal procedures. Even procedures that are often performed by anesthesiologists in operating rooms, such as Bier blocks, are not monitored in a uniform manner when performed in pain clinics. Establishment of intravenous access for procedures also varies among practitioners. Most (72%) practices had treated patients with vasovagal reactions over the past 12 months, but only 42% had simulated cardiac arrests to prepare for these situations. CONCLUSION: While various trends in peri-procedural care are observable, standards of care are not well established. In order to minimize complications associated with interventional pain Management Techniques, the pain Management community should agree on safety guidelines for all procedures, much as these advocated by the American Society of Anesthesiology for surgical anesthetic care.