336,773 research outputs found

    State of The Art and Hot Aspects in Cloud Data Storage Security

    Get PDF
    Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area. In this paper, we examine the state of the art in cloud storage security through an overview of selected peer reviewed publications. We address the question of defining cloud storage security and its different aspects, as well as enumerate the main vec- tors of attack on cloud storage. The reviewed papers present techniques for key management and controlled disclosure of encrypted data in cloud storage, while novel ideas regarding secure operations on encrypted data and methods for pro- tection of data in fully virtualized environments provide a glimpse of the toolbox available for securing cloud storage. Finally, new challenges such as emergent government regulation call for solutions to problems that did not receive enough attention in earlier stages of cloud computing, such as for example geographical location of data. The methods presented in the papers selected for this review represent only a small fraction of the wide research effort within cloud storage security. Nevertheless, they serve as an indication of the diversity of problems that are being addressed

    The insider on the outside: a novel system for the detection of information leakers in social networks

    Get PDF
    Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles

    Deep Level Transient Spectroscopy (DLTS) System And Method

    Get PDF
    A computer-based deep level transient spectroscopy (DLTS) system (10) efficiently digitizes and analyzes capacitance and conductance transients acquired from a test material (13) by conventional DLTS methods as well as by several transient methods, including a covariance method of linear predictive modeling. A unique pseudo-logarithmic data storage scheme allows each transient to be tested at more than eleven different rates, permitting three to five decades of time constants τ to be observed during each thermal scan, thereby allowing high resolution of closely spaced defect energy levels. The system (10) comprises a sensor (12) for detecting capacitance and/or conductance transients, a digitizing mechanism (14) for digitizing the capacitance and/or conductance transients, preamplifiers (16a, 16b) for filtering, amplifying, and for forwarding the transients to the digitizing mechanism (14), a pulse generator (18) for supplying a filling pulse to the test material (13) in a cryostat (24), a trigger conditioner for coordinating the timing between the digitizing mechanism (14) and the pulse generator (18), and a temperature controller (26) for changing the temperature of the cryostat (24).Georgia Tech Research Corporatio

    A self-managing infrastructure for ad-hoc situation determination

    Get PDF
    Automatically determining the situation of an ad-hoc group of people and devices within a smart environment is a significant challenge in pervasive computing systems. Current approaches often rely on an environment expert to correlate the situations that occur with the available sensor data, while other machine learning based approaches require long training periods before the system can be used. This paper presents a novel approach to situation determination that attempts to overcome these issues by providing a reusable library of general situation specifications that can be easily extended to create new specific situations, and immediately deployed without the need of an environment expert. The architecture of an accompanying situation determination infrastructure is provided, which autonomously optimises and repairs itself in reaction to changes or failures in the environment

    Remodelling of the natural product fumagillol employing a reaction discovery approach

    Full text link
    In the search for new biologically active molecules, diversity-oriented synthetic strategies break through the limitation of traditional library synthesis by sampling new chemical space. Many natural products can be regarded as intriguing starting points for diversity-oriented synthesis, wherein stereochemically rich core structures may be reorganized into chemotypes that are distinctly different from the parent structure. Ideally, to be suited to library applications, such transformations should be general and involve few steps. With this objective in mind, the highly oxygenated natural product fumagillol has been successfully remodelled in several ways using a reaction-discovery-based approach. In reactions with amines, excellent regiocontrol in a bis-epoxide opening/cyclization sequence can be obtained by size-dependent interaction of an appropriate catalyst with the parent molecule, forming either perhydroisoindole or perhydroisoquinoline products. Perhydroisoindoles can be further remodelled by cascade processes to afford either morpholinone or bridged 4,1-benzoxazepine-containing structures.P50 GM067041 - NIGMS NIH HHS; P50 GM067041-07 - NIGMS NIH HHS; P50 GM067041-08 - NIGMS NIH HHS; P50 GM067041-09 - NIGMS NIH HH

    PuFFIN--a parameter-free method to build nucleosome maps from paired-end reads.

    Get PDF
    BackgroundWe introduce a novel method, called PuFFIN, that takes advantage of paired-end short reads to build genome-wide nucleosome maps with larger numbers of detected nucleosomes and higher accuracy than existing tools. In contrast to other approaches that require users to optimize several parameters according to their data (e.g., the maximum allowed nucleosome overlap or legal ranges for the fragment sizes) our algorithm can accurately determine a genome-wide set of non-overlapping nucleosomes without any user-defined parameter. This feature makes PuFFIN significantly easier to use and prevents users from choosing the "wrong" parameters and obtain sub-optimal nucleosome maps.ResultsPuFFIN builds genome-wide nucleosome maps using a multi-scale (or multi-resolution) approach. Our algorithm relies on a set of nucleosome "landscape" functions at different resolution levels: each function represents the likelihood of each genomic location to be occupied by a nucleosome for a particular value of the smoothing parameter. After a set of candidate nucleosomes is computed for each function, PuFFIN produces a consensus set that satisfies non-overlapping constraints and maximizes the number of nucleosomes.ConclusionsWe report comprehensive experimental results that compares PuFFIN with recently published tools (NOrMAL, TEMPLATE FILTERING, and NucPosSimulator) on several synthetic datasets as well as real data for S. cerevisiae and P. falciparum. Experimental results show that our approach produces more accurate nucleosome maps with a higher number of non-overlapping nucleosomes than other tools

    HyBIS: Windows Guest Protection through Advanced Memory Introspection

    Full text link
    Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities. Recent trusted boot and additional integrity checks have rendered the Windows OS less vulnerable to kernel-level rootkits. Nevertheless, guest Windows Virtual Machines are becoming an increasingly interesting attack target. In this work we introduce and analyze a novel Hypervisor-Based Introspection System (HyBIS) we developed for protecting Windows OSes from malware and rootkits. The HyBIS architecture is motivated and detailed, while targeted experimental results show its effectiveness. Comparison with related work highlights main HyBIS advantages such as: effective semantic introspection, support for 64-bit architectures and for latest Windows (8.x and 10), advanced malware disabling capabilities. We believe the research effort reported here will pave the way to further advances in the security of Windows OSes
    corecore