8,027 research outputs found

    Threats Management Throughout the Software Service Life-Cycle

    Full text link
    Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE) to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN) and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM) domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Uranium exploration methodology in cold climates

    Get PDF
    The uranium prospecting boom of the past decade had, as a major consequence, the rapid development and proliferation of exploration methods for source materials. Numerous established methods were developed and refined whilst new techniques were introduced proving, in some instances, to be highly successful. To the explorationist the proliferation of instrumental hardware and detection systems was something of a headache with the result that in uranium exploration, more so than in other types of prospecting, the choice of exploration method at the appropriate stage of prospecting was frequently ill founded. The situation also spawned ‘black box’ purveyors who made extravagant claims for their equipment. Money was wasted through over kill applications of exploration method accompanied in many instances by deficiencies in the interpretation of results. This project was originally conceived as a means of evaluating, reviewing and filtering from a burgeoning array of systems the most appropriate exploration techniques applicable to cold climate environments. This goal has been trimmed somewhat since it had been hoped to incorporate site investigation data assembled in the field by the writer as appropriate case history material. This was not possible and as a consequence this report is a 'state of the art review' of the applicability of currently available techniques in Arctic and Subarctic environments. Reference is made to published case history data, where appropriate, supportive of the techniques or methods reviewed.Abstract -- Introduction -- Prospecting methods in relation to Arctic and Subarctic environments -- Review of direct exploration methods -- Radiometric methods -- Airborne spectrometry -- Car borne and hand held instrumentation -- Geochemical methods -- Soil and stream sediment methods -- Geobotanical methods -- Water sampling - Hydrogeochemical methods -- Other metods -- Optimal exploration method selection -- References -- Table of exploration methods discussed in this report

    Nuclear Safeguards R&D and Innovation at the JRC

    Get PDF
    Nuclear safeguards are from the very origin of the Joint Research Centre (JRC), and as enshrined in the EURATOM Treaty, a key duty of the European Commission and a field in which JRC has a fully unique position in Europe. In this area JRC is an un-replaceable R&D partner of Euratom safeguards authority and IAEA through its very extensive support programme. The JRC R&D safeguards programme aims in one hand at maintaining traditional safeguards at level so that deterrence to diversion from civil cycle remains high, taking into account that more installations will need to be safeguarded by EU and international authorities. This relies on development of advanced NDA, DA and CS techniques, full remote and unattended (authenticated) technology and stringent quality systems in measurements and results delivery. In another hand the RD programme put more focus on material flows in sensitive uranium and spent fuel handling facilities and use of fingerprinting techniques to cover diversion scenarios and more performing and accurate environmental sampling techniques and traces analysis. Open-source analysis and development of new tools and methodologies for the control of Import/export are areas where the effort is also increased. In the JRC R&D programme a special attention is also given to the development of accountancy and safeguards concepts for advanced fuel cycles (GenIV) as well as proliferation resistance methodology. This scientific/technical work is encompassed by appropriate training activities. This paper is about some of the new R&D and innovation activities of the JRC as part of the EU contribution to the implementation of effective nuclear safeguards inside and outside the EU.JRC.E.9-Nuclear security (Ispra

    Monitoring Networks through Multiparty Session Types

    Get PDF
    In large-scale distributed infrastructures, applications are realised through communications among distributed components. The need for methods for assuring safe interactions in such environments is recognised, however the existing frameworks, relying on centralised verification or restricted specification methods, have limited applicability. This paper proposes a new theory of monitored π-calculus with dynamic usage of multiparty session types (MPST), offering a rigorous foundation for safety assurance of distributed components which asynchronously communicate through multiparty sessions. Our theory establishes a framework for semantically precise decentralised run-time enforcement and provides reasoning principles over monitored distributed applications, which complement existing static analysis techniques. We introduce asynchrony through the means of explicit routers and global queues, and propose novel equivalences between networks, that capture the notion of interface equivalence, i.e. equating networks offering the same services to a user. We illustrate our static–dynamic analysis system with an ATM protocol as a running example and justify our theory with results: satisfaction equivalence, local/global safety and transparency, and session fidelity
    • …
    corecore