364 research outputs found

    Privacy in an Ambient World

    Get PDF
    Privacy is a prime concern in today's information society. To protect\ud the privacy of individuals, enterprises must follow certain privacy practices, while\ud collecting or processing personal data. In this chapter we look at the setting where an\ud enterprise collects private data on its website, processes it inside the enterprise and\ud shares it with partner enterprises. In particular, we analyse three different privacy\ud systems that can be used in the different stages of this lifecycle. One of them is the\ud Audit Logic, recently introduced, which can be used to keep data private when it\ud travels across enterprise boundaries. We conclude with an analysis of the features\ud and shortcomings of these systems

    Strong and Weak Policy Relations

    Get PDF
    Access control and privacy policy relations tend to focus on decision outcomes and are very sensitive to defined terms and state. Small changes or updates to a policy language or vocabulary may make two similar policies incomparable. To address this we develop two flexible policy relations derived from bisimulation in process calculi. Strong licensing compares the outcome of two policies strictly, similar to strong bisimulation. Weak licensing compares the outcome of policies more flexibly by ignoring irrelevant (non-conflicting) differences between outcomes, similar to weak bisimulation. We illustrate the relations using examples from P3P

    Metrological characterization of a vision-based system for relative pose measurements with fiducial marker mapping for spacecrafts

    Get PDF
    An improved approach for the measurement of the relative pose between a target and a chaser spacecraft is presented. The selected method is based on a single camera, which can be mounted on the chaser, and a plurality of fiducial markers, which can be mounted on the external surface of the target. The measurement procedure comprises of a closed-form solution of the Perspective from n Points (PnP) problem, a RANdom SAmple Consensus (RANSAC) procedure, a non-linear local optimization and a global Bundle Adjustment refinement of the marker map and relative poses. A metrological characterization of the measurement system is performed using an experimental set-up that can impose rotations combined with a linear translation and can measure them. The rotation and position measurement errors are calculated with reference instrumentations and their uncertainties are evaluated by the Monte Carlo method. The experimental laboratory tests highlight the significant improvements provided by the Bundle Adjustment refinement. Moreover, a set of possible influencing physical parameters are defined and their correlations with the rotation and position errors and uncertainties are analyzed. Using both numerical quantitative correlation coefficients and qualitative graphical representations, the most significant parameters for the final measurement errors and uncertainties are determined. The obtained results give clear indications and advice for the design of future measurement systems and for the selection of the marker positioning on a satellite surface

    Generation of novel cationic antimicrobial peptides from natural non-antimicrobial sequences by acid-amide substitution

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Cationic antimicrobial peptides (CAMPs) are well recognized to be promising as novel antimicrobial and antitumor agents. To obtain novel skeletons of CAMPs, we propose a simple strategy using acid-amide substitution (i.e. Glu→Gln, Asp→Asn) to confer net positive charge to natural non-antimicrobial sequences that have structures distinct from known CAMPs. The potential of this strategy was verified by a trial study.</p> <p>Methods</p> <p>The pro-regions of nematode cecropin P1-P3 (P1P-P3P) were selected as parent sequences. P1P-P3P and their acid-amide-substituted mutants (NP1P-NP3P) were chemically synthesized. Bactericidal and membrane-disruptive activities of these peptides were evaluated. Conformational changes were estimated from far-ultraviolet circular dichroism (CD) spectra.</p> <p>Results</p> <p>NP1P-NP3P acquired potent bactericidal activities via membrane-disruption although P1P-P3P were not antimicrobial. Far-ultraviolet CD spectra of NP1P-NP3P were similar to those of their parent peptides P1P-P3P, suggesting that NP1P-NP3P acquire microbicidal activity without remarkable conformational changes. NP1P-NP3P killed bacteria in almost parallel fashion with their membrane-disruptive activities, suggesting that the mode of action of those peptides was membrane-disruption. Interestingly, membrane-disruptive activity of NP1P-NP3P were highly diversified against acidic liposomes, indicating that the acid-amide-substituted nematode cecropin pro-region was expected to be a unique and promising skeleton for novel synthetic CAMPs with diversified membrane-discriminative properties.</p> <p>Conclusions</p> <p>The acid-amide substitution successfully generated some novel CAMPs in our trial study. These novel CAMPs were derived from natural non-antimicrobial sequences, and their sequences were completely distinct from any categories of known CAMPs, suggesting that such mutated natural sequences could be a promising source of novel skeletons of CAMPs.</p

    Examined Lives: Informational Privacy and the Subject as Object

    Get PDF
    In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests. On a theoretical level, data processors and other data privacy opponents argue that imposing restrictions on the collection, use, and exchange of personal data would ignore established understandings of property, limit individual freedom of choice, violate principles of rational information use, and infringe data processors\u27 freedom of speech. In this article, Professor Julie Cohen explores these theoretical challenges to informational privacy protection. She concludes that categorical arguments from property, choice, truth, and speech lack weight, and mask fundamentally political choices about the allocation of power over information, cost, and opportunity. Each debate, although couched in a rhetoric of individual liberty, effectively reduces individuals to objects of choices and trades made by others. Professor Cohen argues, instead, that the debate about data privacy protection should be grounded in an appreciation of the conditions necessary for individuals to develop and exercise autonomy in fact, and that meaningful autonomy requires a degree of freedom from monitoring, scrutiny, and categorization by others. The article concludes by calling for the design of both legal and technological tools for strong data privacy protection
    • …
    corecore