40,285 research outputs found

    A Diffie-Hellman based key management scheme for hierarchical access control

    Get PDF
    All organizations share data in a carefully managed fashion\ud by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes. Data from a certain security class can only be accessed by another security class, if it is higher or at the same level in the hierarchy. Otherwise access is denied. Our solution is based on the Die-Hellman key exchange protocol. We show, that the theoretical worst case performance of our solution is slightly better than that of all other existing solutions. We also show, that our performance in practical cases is linear in the size of the hierarchy, whereas the best results from the literature are quadratic

    Pattern Reification as the Basis for Description-Driven Systems

    Full text link
    One of the main factors driving object-oriented software development for information systems is the requirement for systems to be tolerant to change. To address this issue in designing systems, this paper proposes a pattern-based, object-oriented, description-driven system (DDS) architecture as an extension to the standard UML four-layer meta-model. A DDS architecture is proposed in which aspects of both static and dynamic systems behavior can be captured via descriptive models and meta-models. The proposed architecture embodies four main elements - firstly, the adoption of a multi-layered meta-modeling architecture and reflective meta-level architecture, secondly the identification of four data modeling relationships that can be made explicit such that they can be modified dynamically, thirdly the identification of five design patterns which have emerged from practice and have proved essential in providing reusable building blocks for data management, and fourthly the encoding of the structural properties of the five design patterns by means of one fundamental pattern, the Graph pattern. A practical example of this philosophy, the CRISTAL project, is used to demonstrate the use of description-driven data objects to handle system evolution.Comment: 20 pages, 10 figure

    Hierarchies of Inefficient Kernelizability

    Full text link
    The framework of Bodlaender et al. (ICALP 2008) and Fortnow and Santhanam (STOC 2008) allows us to exclude the existence of polynomial kernels for a range of problems under reasonable complexity-theoretical assumptions. However, there are also some issues that are not addressed by this framework, including the existence of Turing kernels such as the "kernelization" of Leaf Out Branching(k) into a disjunction over n instances of size poly(k). Observing that Turing kernels are preserved by polynomial parametric transformations, we define a kernelization hardness hierarchy, akin to the M- and W-hierarchy of ordinary parameterized complexity, by the PPT-closure of problems that seem likely to be fundamentally hard for efficient Turing kernelization. We find that several previously considered problems are complete for our fundamental hardness class, including Min Ones d-SAT(k), Binary NDTM Halting(k), Connected Vertex Cover(k), and Clique(k log n), the clique problem parameterized by k log n

    Social rank overrides environmental and community fluctuations in determining meat access by female chimpanzees in the Taï National Park, Côte d’Ivoire

    Get PDF
    Meat, long hypothesized as an important food source in human evolution, is still a substantial component of the modern human diet, with some humans relying entirely on meat during certain times of the year. Understanding the socio-ecological context leading to the successful acquisition and consumption of meat by chimpanzees (Pan troglodytes), our closest living relative, can provide insight into the emergence of this trait because humans and chimpanzees are unusual among primates in that they both (i) hunt mammalian prey, (ii) share meat with community members, and (iii) form long-term relationships and complex social hierarchies within their communities. However, females in both human hunter-gatherer societies as well as chimpanzee groups rarely hunt, instead typically accessing meat via males that share meat with group members. In general, female chimpanzee dominance rank affects feeding competition, but so far, the effect of female dominance rank on meat access found different results within and across studied chimpanzee groups. Here we contribute to the debate on how female rank influences meat access while controlling for several socio-ecological variables. Multivariate analyses of 773 separate meat-eating events collected over more than 25 years from two chimpanzee communities located in the Taï National Park, Côte d’Ivoire, were used to test the importance of female dominance rank for being present at, and for acquiring meat, during meat-eating events. We found that high-ranking females were more likely to be present during a meat-eating event and, in addition, were more likely to eat meat compared to the subordinates. These findings were robust to both large demographic changes (decrease of community size) and seasonal ecological changes (fruit abundance dynamics). In addition to social rank, we found that other female properties had a positive influence on presence to meat-eating events and access to meat given presence, including oestrus status, nursing of a small infant, and age. Similar to findings in other chimpanzee populations, our results suggest that females reliably acquire meat over their lifetime despite rarely being active hunters. The implication of this study supports the hypothesis that dominance rank is an important female chimpanzee property conferring benefits for the high-ranking females
    • …
    corecore