45 research outputs found

    Between quantum logic and concurrency

    Full text link
    We start from two closure operators defined on the elements of a special kind of partially ordered sets, called causal nets. Causal nets are used to model histories of concurrent processes, recording occurrences of local states and of events. If every maximal chain (line) of such a partially ordered set meets every maximal antichain (cut), then the two closure operators coincide, and generate a complete orthomodular lattice. In this paper we recall that, for any closed set in this lattice, every line meets either it or its orthocomplement in the lattice, and show that to any line, a two-valued state on the lattice can be associated. Starting from this result, we delineate a logical language whose formulas are interpreted over closed sets of a causal net, where every line induces an assignment of truth values to formulas. The resulting logic is non-classical; we show that maximal antichains in a causal net are associated to Boolean (hence "classical") substructures of the overall quantum logic.Comment: In Proceedings QPL 2012, arXiv:1407.842

    A Taxonomy for Incidents in Communication Systems

    Get PDF
    This report deals with the construction of a taxonomy of incidents in communication systems and is organised as follows: the first section concerns a survey of existing taxonomies, glossaries or controlled languages for computer security incidents. It starts with a definition of the terms used in this report and a discussion on the use of taxonomies as measurement tools. The survey aims at clarifying the importance of the definition of a common language for exchanging and gathering information on computer security. The second section presents the original ideas for the taxonomy proposed with this report. The main assumption is in the definition of the main functions a communication system should perform and in defining a disruption as the lack of one of these functions. The third section is the actual presentation of the taxonomy. Some examples of classification in this taxonomy of known computer security incidents are added. While the overall aim of this work is at the construction of complete taxonomy for communication systems --- including the telecommunication services --- the examples provided in this section will mainly deal with disruptions occurring in the Internet domain. The fourth section presents the future work to be done for continuing the development of the taxonomy proposed here.JRC.G.6-Security technology assessmen

    Computers and Coordination of Debate II

    Get PDF
    This report is the continuation of the JRC report 115574 Computers and Coordination of Debate. In that report the stress was on the classification of computer tools from the perspective of the relative strength of the procedure adopted for keeping order in a debate and on the representation of the flow of argumentation. In this report, we devote more attention to a subclass of the tools previously considered: tools for the coordination of open debates, that is debates without an explicit conclusion in form of a common decision taken by the assembly. Common decision usually recorded in some act or document, possibly after a vote. This report is composed by two main sections and its aim is at proposing some assessment criteria for the design and analysis of tools for the coordination of debates and checking the usefulness of these criteria against a sample of existing tools. These tools are listed and analysed in the second section while the first section describes the criteria, called here analytical lenses, adopted during the analysis. This report is prepared from the perspective of Computer Science, with a specific point of view: the design of communication systems. Implications to policy making is addressed only marginally, when required as an ingredient for the analysis but it is not the primary point of view. This report is the result of a collaboration among JRC E.2, JRC H.1 and ESTAT A.1.JRC.E.2 - Technology Innovation in Securit

    Requirements of a Quantum Key Distribution Reference Platform. JRC Project 867 Quantum Cryptography Study

    Get PDF
    The concept of a quantum key distribution reference platform is defined and the background against which the requirements for such a platform have been identified is explained. Availability of products, forthcoming QKD networks, standards, and the character of the market are explained. The requirements themselves are listed, with a brief explanation of the rationale for each. The main applications of interest are described.JRC.G.5-Security technology assessmen

    Design of a Controlled Language for Critical Infrastructures Protection

    Get PDF
    We describe a project for the construction of controlled language for critical infrastructures protection (CIP). This project originates from the need to coordinate and categorize the communications on CIP at the European level. These communications can be physically represented by official documents, reports on incidents, informal communications and plain e-mail. We explore the application of traditional library science tools for the construction of controlled languages in order to achieve our goal. Our starting point is an analogous work done during the sixties in the field of nuclear science known as the Euratom Thesaurus.JRC.G.6-Security technology assessmen

    A model of distributed key generation for industrial control systems

    Get PDF
    11th International Workshop on Discrete Event Systems, WODES 2012; Guadalajara, Jalisco; Mexico; 3 October 2012 through 5 October 2012The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of an effective key management infrastructure supporting a cryptographic layer. In this paper, we describe a "model of distributed key generation for industrial control systems" we have recently implemented. The model is based on a known Distributed Key Generator protocol we have adapted to an industrial control system environment and to the related communication protocol (Modbus). To validate in a formal way selected security properties of the model, we introduced a Petri Nets representation. This representation allows for modeling attacks against the protocol and understanding some potential weaknesses of its implementation in the industrial control system environment

    The Impact of quantum technologies on the EU's Future Policies: Part 3 Perspectives for Quantum Computing

    Get PDF
    This report describes a survey of opinions in relevant technology communities regarding the best options for research and development of quantum computing, the likely impact on various sectors, and the expected timescales. The survey is intended to contribute to the preparatory discussions for the quantum technology Future and Emerging Technology (FET) Flagship, planned for 2020-30. The overall view of the participants on the technological perspectives for quantum computing is positive and it is seen as likely to be benign.JRC.E.2-Technology Innovation in Securit

    Role of thesauri in a scientific organisation

    Get PDF
    We aim to describe the mediation language between users and indexers in a document retrieval system for a big scientific community intimately related to European Union policies. We assume that this mediation is played by thesauri: sets of indexes apparently coordinating the possible searches by means of term-to-term relations like NT, RT and so on. While persons-to-terms relations are consequent to the use of thesauri for indexing and retrieval, person-to-person relations are embodied into a thesaurus via the implicit repre- sentation of the organisation it serves. In this way, thesauri constitute a network of mediation having historical, social and - because of the scien- tific community served - scientific and technological perspectives. These three perspectives are embedded in time, since changes in organisation change the person-to-person relations, change in retrieval and indexing needs change the person-to-term relations and changes in document type and science change term-to-term relations. In particular, we want to analyse the network originally proposed by the EURATOM thesaurus (1st ed.; European Atomic Energy Community. Information and Documentation Center, Brussels, 1964) and the network of relations - in the three perspectives above - it assumed. Subsequently, we compare the results of this analysis with a more recent thesaurus designed for a community very close to the one originating the EURATOM thesaurus. In doing this, we designed a system that aims the user to browse a path built through the relations. Its in- terface is based on different concepts: Focus+Context and Elastic Grid, which led to the creation of a flexible graphical structure characterised by hierarchically-arranged and scalable information visualisation

    JRC FAIR Data Guidelines

    Get PDF
    The JRC Data Policy requires that JRC Data be managed following the FAIR (Findable, Accessible, Interoperable, Reusable) Principles. This paper is a deliverable of the JRC Data Strategy in its call to publish Guidelines to support and enhance the FAIRness of JRC data. The paper provides a framework for evaluating and increasing the level of adherence of JRC datasets to the FAIR Principles, while taking into account specific solutions and strategies available to data publishers. It proposes five progressive levels of FAIR Maturity, indicating which of the FAIR maturity indicators the levels follow and suggesting steps that can improve their FAIR maturity level.JRC.T.4 - Data Governance and Service
    corecore