373,376 research outputs found

    Regulating Search Warrant Execution Procedure for Stored Electronic Communications

    Get PDF
    Electronic communication services, from email, to social media, tomessaging applications, have not only dramatically changed daily life but have also had a profound impact on criminal investigations and procedure.The often large volume of electronically stored information has led to a two-step process for search warrant execution, codified in Federal Criminal Procedure Rule 41. When conducting a search pursuant to Rule 41, law enforcement often retains both responsive items—materials that fall within the scope of the warrant—and nonresponsive materials—intermingled items that can be searched, but ultimately exceed the scope of the warrant. This possession of nonresponsive material creates a tension between the account holder’s privacy interests and the government’s ability to conduct an effective search.Courts and scholars have implemented and proposed a range of approaches for search warrant execution inlight of concerns about sweeping general searches and the practicalities of searching electronically stored information. This Note examines these approaches to regulate search warrant execution procedure in the context of stored electronic communications. This Note also discusses the strengths and shortcomings of these various mechanisms and concludes that Rule 41 should be amended to provide standards for the retention and use of nonresponsive material

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe

    Natural language processing

    Get PDF
    Beginning with the basic issues of NLP, this chapter aims to chart the major research activities in this area since the last ARIST Chapter in 1996 (Haas, 1996), including: (i) natural language text processing systems - text summarization, information extraction, information retrieval, etc., including domain-specific applications; (ii) natural language interfaces; (iii) NLP in the context of www and digital libraries ; and (iv) evaluation of NLP systems

    "Re-engineering Cyprus" : information technologies and transformation processes in the Republic of Cyprus

    Get PDF
    By most Western Europeans Cyprus is probably perceived as a tourist resort rather than a technologically highly developed country. Interested German visitors are informed by the travel brochure published by the Republic of Cyprus' tourist office that "in the villages old customs and traditions still exist" (Zypern. 9000 Jahre Geschichte und Kultur 1997, 11). Pictures of places of antiquity, churches, monasteries, fortresses, archaic villages and of people engaged in agricultural work and crafts convey the image of a traditional Mediterranean society. However, the Republic of Cyprus is a rapidly modernising country. It has developed recently "from a poor agrarian into a high-income service economy" (Christodoulou 1995, 11) and "radical transformation processes" are observed (cf. ibid., 18). The forthcoming accession to the European Union additionally accelerates the pace of these transformation processes. Due to its position on the extreme rim of Europe in the Eastern Mediterranean region at the crossroads of three continents, the island is perceived both as marginal (cf. Pace 1999) and as a link between Europe and the Asian and African continents (cf. Kasoulides 1999). Cyprus is conceptualised for the future as a centre and intersection: as regional hub of the modern capital market, as communications and trade centre in the Eastern Mediterranean, as "telecommunications hub for the Eastern Mediterranean and Middle East region", as "international services centre". The Republic of Cyprus has a highly developed telecommunications infrastructure, which is the basic prerequisite for the conversion into such a centre and is one of the most important factors for the economic competitiveness of Cyprus. The global nature of communication platforms today, especially the Internet, is regarded as the key to the integration of Cyprus into the world economy. By implementing information technologies and promoting necessary expertise, economic progress and modernisation of the country as well as its global competitiveness is assumed to be guaranteed. Investments in the information technology infrastructure are regarded as essential for the development of Cyprus, fostering the implementation of the information society. This aim and the necessary implementation measures feature increasingly on the agendas of scientific and economic conferences and symposia in Cyprus

    The Distribution of Path Losses for Uniformly Distributed Nodes in a Circle

    Get PDF
    When simulating a wireless network, users/nodes are usually assumed to be distributed uniformly in space. Path losses between nodes in a simulated network are generally calculated by determining the distance between every pair of nodes and applying a suitable path loss model as a function of this distance (power of distance with an environment-specific path loss exponent) and adding a random component to represent the log-normal shadowing. A network with nodes consists of (−1)/2 path loss values. In order to generate statistically significant results for system-level simulations, Monte Carlo simulations must be performed where the nodes are randomly distributed at the start of every run. This is a time-consuming operation which need not be carried out if the distribution of path losses between the nodes is known. The probability density function (pdf) of the path loss between the centre of a circle and a node distributed uniformly within a the circle is derived in this work

    Datacenter Traffic Control: Understanding Techniques and Trade-offs

    Get PDF
    Datacenters provide cost-effective and flexible access to scalable compute and storage resources necessary for today's cloud computing needs. A typical datacenter is made up of thousands of servers connected with a large network and usually managed by one operator. To provide quality access to the variety of applications and services hosted on datacenters and maximize performance, it deems necessary to use datacenter networks effectively and efficiently. Datacenter traffic is often a mix of several classes with different priorities and requirements. This includes user-generated interactive traffic, traffic with deadlines, and long-running traffic. To this end, custom transport protocols and traffic management techniques have been developed to improve datacenter network performance. In this tutorial paper, we review the general architecture of datacenter networks, various topologies proposed for them, their traffic properties, general traffic control challenges in datacenters and general traffic control objectives. The purpose of this paper is to bring out the important characteristics of traffic control in datacenters and not to survey all existing solutions (as it is virtually impossible due to massive body of existing research). We hope to provide readers with a wide range of options and factors while considering a variety of traffic control mechanisms. We discuss various characteristics of datacenter traffic control including management schemes, transmission control, traffic shaping, prioritization, load balancing, multipathing, and traffic scheduling. Next, we point to several open challenges as well as new and interesting networking paradigms. At the end of this paper, we briefly review inter-datacenter networks that connect geographically dispersed datacenters which have been receiving increasing attention recently and pose interesting and novel research problems.Comment: Accepted for Publication in IEEE Communications Surveys and Tutorial

    Adaptive conflict-free optimization of rule sets for network security packet filtering devices

    Get PDF
    Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices
    corecore