318 research outputs found
Towards compliant data retention with probe storage on patterned media
We describe how the compliance requirements for data retention
from recent laws such as the US Sarbanes Oxley Act may be supported
by a tamper-evident secure storage system based on probe
storage with a patterned magnetic medium. This medium supports
normal read/write operations by out-of-plane magnetisation of individual
dots. We report on an experiment to show that in principle
the medium also supports a separate class of write-once operation
that destroys the out-of-plane magnetisation property of the dots
irreversibly by precise local heating. The write-once operation
can be used to support flexible data retention by tamper-evident
writing and physical data deletion
Lambda Calculus for Engineers
In pure functional programming it is awkward to use a stateful sub-computation in a predominantly stateless computation. The problem is that the state of the subcomputation has to be passed around using ugly plumbing. Classical examples of the plumbing problem are: providing a supply of fresh names, and providing a supply of random numbers. We propose to use (deterministic) inductive definitions rather than recursion equations as a basic paradigm and show how this makes it easier to add the plumbing
On the evaluation of Web Radio
We develop an evaluation method for Web radio, and perform it to see what we can be learnt about seven prominent Web radio sites. We also evaluate a commercial FM radio station for control purposes. We present a taxonomy of Web radio, and we give our observations and conclusions on this evaluation
On consistency maintenance in service discovery
Communication and node failures degrade the ability of a service discovery protocol to ensure Users receive the correct service information when the service changes. We propose that service discovery protocols employ a set of recovery techniques to recover from failures and regain consistency. We use simulations to show that the type of recovery technique a protocol uses significantly impacts the performance. We benchmark the performance of our own service discovery protocol, FRODO against the performance of first generation service discovery protocols, Jini and UPnP during increasing communication and node failures. The results show that FRODO has the best overall consistency maintenance performance
Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow
Synchronous Data flow (SDF) graphs have a simple
and elegant semantics (essentially linear algebra) which makes
SDF graphs eminently suitable as a vehicle for studying scheduling
optimisations. We extend related work on using SPIN to
experiment with scheduling optimisations aimed at minimising
buffer requirements.We show that for a benchmark of commonly
used case studies the performance of our SPIN based scheduler
is comparable to that of state of the art research tools. The
key to success is using the semantics of SDF to prove when using
(even unsound and/or incomplete) optimisations are justified. The
main benefit of our approach lies in gaining deep insight in the
optimisations at relatively low cost
Benchmarking Block Ciphers for Wireless Sensor Networks
Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for WSNs based on existing literature. For evaluating and assessing these candidates, we have devised a systematic framework that not only considers the security properties but also the storage- and energy-efficency of the candidates. Finally, based on the evaluation results, we have selected the suitable ciphers for WSNs, namely Rijndael for high security and energy efficiency requirements; and MISTY1 for good storage and energy efficiency
Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain
The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness.
An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means.
This paper presents the Portunes model, a model for describing and analyzing attack scenarios across the three security areas. Portunes formally describes security alignment of an organization and finds attack scenarios by analyzing inconsistencies between policies from the different security areas. For this purpose, the paper defines a language in the tradition of the Klaim family of languages, and uses graph-based algorithms to find attack scenarios that can be described using the defined language
Towards Tamper-Evident Storage on Patterned Media
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by out-of-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irreversibly by precise local heating. We discuss the main issues of designing a tamper-evident storage device and file system using the properties of the medium
On the Cost and Benefits of Building a High-Quality Institutional Repository
Much has been written about the difficulties of getting staff and
students to contribute to an Institutional Repository (IR). The most
difficult objections of staff to deal with are lack of time, and uncertainty
about the benefits. We report on the measures that we have
taken when building an IR to address those objections, indicating
which were successful and which failed. We then propose a set of
parameters to capture the quality, cost, and benefits of maintaining
an IR in a quantitative manner, using the parameters to compare
three IR. Our proposal is a first step towards a more objective approach
towards evaluating IR
- …