185,716 research outputs found
Normalizing Relations: One-to-One Relationships
This paper discusses problems and confusion that can arise in normalizing certain relations, using the commonly accepted practices of identifying primary keys and defining normal forms. Specifically, normalization of relations that combines information on two different entities with a one-to-one relationship is discussed. It is shown that for such relations, using the standard normalization procedures may lead to the conclusion that a relation in Boyce-Codd normal form (BCNF) still suffers from insertion and deletion anomalies. Methods to deal with such cases are presented
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial.
This is because a user's identity is itself a public key. Moreover, the private
key corresponding to the identity needs to be obtained from a trusted key
authority through an authenticated and secrecy protected channel. So far, there
exist only a very small number of revocable IBE (RIBE) schemes that support
non-interactive key revocation, in the sense that the user is not required to
interact with the key authority or some kind of trusted hardware to renew her
private key without changing her public key (or identity). These schemes are
either proven to be only selectively secure or have public parameters which
grow linearly in a given security parameter. In this paper, we present two
constructions of non-interactive RIBE that satisfy all the following three
attractive properties: (i) proven to be adaptively secure under the Symmetric
External Diffie-Hellman (SXDH) and the Decisional Linear (DLIN) assumptions;
(ii) have constant-size public parameters; and (iii) preserve the anonymity of
ciphertexts---a property that has not yet been achieved in all the current
schemes
Constraints for Semistructured Data and XML
Integrity constraints play a fundamental role in database design. We review initial work on the expression of integrity constraints for semistructured data and XML
The construction and evaluation of an achievement test of musical knowledge for grades VII-XII.
Thesis (M.M.E.)--Boston Universit
SDNsec: Forwarding Accountability for the SDN Data Plane
SDN promises to make networks more flexible, programmable, and easier to
manage. Inherent security problems in SDN today, however, pose a threat to the
promised benefits. First, the network operator lacks tools to proactively
ensure that policies will be followed or to reactively inspect the behavior of
the network. Second, the distributed nature of state updates at the data plane
leads to inconsistent network behavior during reconfigurations. Third, the
large flow space makes the data plane susceptible to state exhaustion attacks.
This paper presents SDNsec, an SDN security extension that provides
forwarding accountability for the SDN data plane. Forwarding rules are encoded
in the packet, ensuring consistent network behavior during reconfigurations and
limiting state exhaustion attacks due to table lookups. Symmetric-key
cryptography is used to protect the integrity of the forwarding rules and
enforce them at each switch. A complementary path validation mechanism allows
the controller to reactively examine the actual path taken by the packets.
Furthermore, we present mechanisms for secure link-failure recovery and
multicast/broadcast forwarding.Comment: 14 page
A microtonal wind controller building on Yamaha’s technology to facilitate the performance of music based on the “19-EDO” scale
We describe a project in which several collaborators adapted an existing instrument to make
it capable of playing expressively in music based on the microtonal scale characterised by equal
divsion of the octave into 19 tones (“19-EDO”). Our objective was not just to build this instrument,
however, but also to produce a well-formed piece of music which would exploit it
idiomatically, in a performance which would provide listeners with a pleasurable and satisfying
musical experience. Hence, consideration of the extent and limits of the playing-techniques of
the resulting instrument (a “Wind-Controller”) and of appropriate approaches to the composition
of music for it were an integral part of the project from the start. Moreover, the intention
was also that the piece, though grounded in the musical characteristics of the 19-EDO scale,
would nevertheless have a recognisable relationship with what Dimitri Tymoczko (2010) has
called the “Extended Common Practice” of the last millennium. So the article goes on to consider
these matters, and to present a score of the resulting new piece, annotated with comments
documenting some of the performance issues which it raises. Thus, bringing the project to
fruition involved elements of composition, performance, engineering and computing, and the
article describes how such an inter-disciplinary, multi-disciplinary and cross-disciplinary collaboration
was co-ordinated in a unified manner to achieve the envisaged outcome. Finally, we
consider why the building of microtonal instruments is such a problematic issue in a contemporary
(“high-tech”) society like ours
A new key exchange protocol based on the decomposition problem
In this paper we present a new key establishment protocol based on the
decomposition problem in non-commutative groups which is: given two elements
of the platform group and two subgroups (not
necessarily distinct), find elements such that . Here we introduce two new ideas that improve the security of key
establishment protocols based on the decomposition problem. In particular, we
conceal (i.e., do not publish explicitly) one of the subgroups , thus
introducing an additional computationally hard problem for the adversary,
namely, finding the centralizer of a given finitely generated subgroup.Comment: 7 page
- …