40,285 research outputs found
A Diffie-Hellman based key management scheme for hierarchical access control
All organizations share data in a carefully managed fashion\ud
by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes. Data from a certain security class can only be accessed by another security class, if it is higher or at the same level in the hierarchy. Otherwise access is denied. Our solution is based on the Die-Hellman key exchange protocol. We show, that the theoretical worst case performance of our solution is slightly better than that of all other existing solutions. We also show, that our performance in practical cases is linear in the size of the hierarchy, whereas the best results from the literature are quadratic
Pattern Reification as the Basis for Description-Driven Systems
One of the main factors driving object-oriented software development for
information systems is the requirement for systems to be tolerant to change. To
address this issue in designing systems, this paper proposes a pattern-based,
object-oriented, description-driven system (DDS) architecture as an extension
to the standard UML four-layer meta-model. A DDS architecture is proposed in
which aspects of both static and dynamic systems behavior can be captured via
descriptive models and meta-models. The proposed architecture embodies four
main elements - firstly, the adoption of a multi-layered meta-modeling
architecture and reflective meta-level architecture, secondly the
identification of four data modeling relationships that can be made explicit
such that they can be modified dynamically, thirdly the identification of five
design patterns which have emerged from practice and have proved essential in
providing reusable building blocks for data management, and fourthly the
encoding of the structural properties of the five design patterns by means of
one fundamental pattern, the Graph pattern. A practical example of this
philosophy, the CRISTAL project, is used to demonstrate the use of
description-driven data objects to handle system evolution.Comment: 20 pages, 10 figure
Hierarchies of Inefficient Kernelizability
The framework of Bodlaender et al. (ICALP 2008) and Fortnow and Santhanam
(STOC 2008) allows us to exclude the existence of polynomial kernels for a
range of problems under reasonable complexity-theoretical assumptions. However,
there are also some issues that are not addressed by this framework, including
the existence of Turing kernels such as the "kernelization" of Leaf Out
Branching(k) into a disjunction over n instances of size poly(k). Observing
that Turing kernels are preserved by polynomial parametric transformations, we
define a kernelization hardness hierarchy, akin to the M- and W-hierarchy of
ordinary parameterized complexity, by the PPT-closure of problems that seem
likely to be fundamentally hard for efficient Turing kernelization. We find
that several previously considered problems are complete for our fundamental
hardness class, including Min Ones d-SAT(k), Binary NDTM Halting(k), Connected
Vertex Cover(k), and Clique(k log n), the clique problem parameterized by k log
n
Social rank overrides environmental and community fluctuations in determining meat access by female chimpanzees in the Taï National Park, Côte d’Ivoire
Meat, long hypothesized as an important food source in human evolution, is still a substantial component of the modern human diet, with some humans relying entirely on meat during certain times of the year. Understanding the socio-ecological context leading to the successful acquisition and consumption of meat by chimpanzees (Pan troglodytes), our closest living relative, can provide insight into the emergence of this trait because humans and chimpanzees are unusual among primates in that they both (i) hunt mammalian prey, (ii) share meat with community members, and (iii) form long-term relationships and complex social hierarchies within their communities. However, females in both human hunter-gatherer societies as well as chimpanzee groups rarely hunt, instead typically accessing meat via males that share meat with group members. In general, female chimpanzee dominance rank affects feeding competition, but so far, the effect of female dominance rank on meat access found different results within and across studied chimpanzee groups. Here we contribute to the debate on how female rank influences meat access while controlling for several socio-ecological variables. Multivariate analyses of 773 separate meat-eating events collected over more than 25 years from two chimpanzee communities located in the Taï National Park, Côte d’Ivoire, were used to test the importance of female dominance rank for being present at, and for acquiring meat, during meat-eating events. We found that high-ranking females were more likely to be present during a meat-eating event and, in addition, were more likely to eat meat compared to the subordinates. These findings were robust to both large demographic changes (decrease of community size) and seasonal ecological changes (fruit abundance dynamics). In addition to social rank, we found that other female properties had a positive influence on presence to meat-eating events and access to meat given presence, including oestrus status, nursing of a small infant, and age. Similar to findings in other chimpanzee populations, our results suggest that females reliably acquire meat over their lifetime despite rarely being active hunters. The implication of this study supports the hypothesis that dominance rank is an important female chimpanzee property conferring benefits for the high-ranking females
- …