958 research outputs found

    Windows of memory: perspective panels to communicate archeological heritage

    Get PDF
    Virtual Archaeology assumed, since the second half of 1900, an educational role: digital reconstructions of monuments, cities and territories aim to communicate the ancient cultural heritage using tools, immediately suitable for the large public, which can thus make a proper, yet intuitive reading of the past, thanks to the likelihood of the images represented. However, this "virtuality" in no way can be compared with the excitement of the visit to an archaeological site, which inevitably leads to a strong impact on the cognitive processes of the visitors. We propose an innovative exhibition in situ of some Greek and Roman ruins, based on a correct hypothesis of reconstruction with a virtual 3D model: the aim of our project is to help the visitor to interpreter the lost spatiality of the monument during the visit archaeological tour. In order to enrich the emotional impact of the visitor and make easier to communicate the historical and architectural value of the archaeological heritage, our project provides a display based on a brand new visual effect of anamorphic perspectives that, overlapping a drawing to the ruins still visible, reconstructs in the eyes of the observer, the original shape of the building. It is a recomposition of signs in a single perspective view, transcribed on a glass panel that we have named "Windows of memory". The transparent panels on which are printed some perspective views taken from the 3D virtual model, collaborate actively in the unveiling the lost architecture, in a cognitive process of strong impact, comparable only to the more expensive "augmented reality", that, however, interposes an electronic device between the object and the observer, where anamorphosis allows you to enjoy the architectonic space only through the direct vision. The project we propose in the article is a flexible solution to be adapted to several archeological sites. It will provide the observer with an emotional experience, so communicating, through a multisensorial effect, the inner value of the good visited

    Covert channel detection using Information Theory

    Full text link
    This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels. We then show that even an enhanced notion of "iterated multivalued interference" can not capture flows with capacity lower than one bit of information per channel use. We then characterize and compute the capacity of covert channels that use control flows for a class of systems.Comment: In Proceedings SecCo 2010, arXiv:1102.516

    DATABASE SECURITY

    Get PDF
    Ensuring the security of databases is a complex issue. The more complex the databases are the more complex the security measures that are to be applied are. Network and Internet connections to databases may complicate things even further. Also, each and every additional internal user that would be added can create further serious security problems. The purpose of this paper is to highlight and identify the main methods and facets of attack on a database, as well as ways to deflect attacks, through focusing on the delicate issue of data inference.This paper will examine the different topics related to database security and see the adaption of the research to the changing environment

    Security assessment methodology for isolated systems of a certain class

    Get PDF
    This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level

    Security assessment methodology for isolated systems of a certain class

    Get PDF
    This paper introduces security assessment methodology for isolated single-workstation multilayer systems processing sensitive or classified data according with a corresponding security model for such system. The document provides a high-level tool for systematizing certain-class-systems security models development. The models based on the introduced methodology cover data confidentiality and availability attributes protection on a sufficient level

    Information Security Foundations for Electronic Medical Records

    Get PDF
    Electronic medical records are clearly in the future and should provide benefits to all parties. Trust in the information is dependent upon the security of the system and the history of security associated with distributed electronic record systems should initiate many questions for such a critical system. The current methodology of broad regulatory guidance and letting industry “do its best” has failed in the financial sector with identity theft becoming a significant crime. Allowing the same outcome to occur in electronic medical records will both limit the efficiencies and imperil lives. The solution is to enjoin security from the ground up in a tight knit method similar to national security systems, and to do that across the myriad of players will require regulation. This paper explores the basis for the regulation of technical solutions and proposes a form in which they can be employed

    A Survey of Computer Security Models

    Get PDF
    ABSTRACT A security model maps the abstract goals of the security policy of information system by specifying information flow necessary to enforce the security policy. The security model that characterize the security goal in a form, which are then mapped to system details. The security model takes the requirement and provides the necessary mathematical formulas, relationships, and structure to be followed to accomplish the security goal. This paper gives brief introduction of security model from the beginning
    corecore