68 research outputs found

    SciTokens: Capability-Based Secure Access to Remote Scientific Data

    Full text link
    The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the problems, re-run their computations, and wait longer for their results. In this paper, we introduce SciTokens, open source software to help scientists manage their security credentials more reliably and securely. We describe the SciTokens system architecture, design, and implementation addressing use cases from the Laser Interferometer Gravitational-Wave Observatory (LIGO) Scientific Collaboration and the Large Synoptic Survey Telescope (LSST) projects. We also present our integration with widely-used software that supports distributed scientific computing, including HTCondor, CVMFS, and XrootD. SciTokens uses IETF-standard OAuth tokens for capability-based secure access to remote scientific data. The access tokens convey the specific authorizations needed by the workflows, rather than general-purpose authentication impersonation credentials, to address the risks of scientific workflows running on distributed infrastructure including NSF resources (e.g., LIGO Data Grid, Open Science Grid, XSEDE) and public clouds (e.g., Amazon Web Services, Google Cloud, Microsoft Azure). By improving the interoperability and security of scientific workflows, SciTokens 1) enables use of distributed computing for scientific domains that require greater data protection and 2) enables use of more widely distributed computing resources by reducing the risk of credential abuse on remote systems.Comment: 8 pages, 6 figures, PEARC '18: Practice and Experience in Advanced Research Computing, July 22--26, 2018, Pittsburgh, PA, US

    Automatische Vermittlung zwischen Interaktionsstilen

    Get PDF
    Die Wiederverwendung von Softwarekomponenten wird häufig durch Inkompatibilitäten behindert. Ein Problem dabei sind unterschiedliche Interaktionsstile. Es soll ein System entwickelt werden, das automatisch zwischen verschiedenen Stilen vermitteln kann

    Journal of Neurodevelopmental Disorders is now a fully open access journal

    Get PDF
    AbstractWith the publication of the first articles of this 2012 volume, the Journal of Neurodevelopmental Disorders enters the exciting world of open access publishing. The Journal will now be published by BioMed Central, (part of Springer Science+Business Media) as a fully open access journal. This change will mean that all articles will be made freely and permanently accessible online immediately upon publication, will be available to readers throughout the world without subscription charges or registration barriers, and be indexed in both PubMed and PubMed Central

    A peeling theorem for the Weyl tensor in higher dimensions

    Full text link
    A peeling theorem for the Weyl tensor in higher dimensional Lorentzian manifolds is presented. We obtain it by generalizing a proof from the four dimensional case. We derive a generic behavior, discuss interesting subcases and retrieve the four dimensional result.Comment: 11 pages, 0 figure

    Value co-creation in the delivery of outcome-based contracts for business-to-business service

    Get PDF
    Working paperThis study introduces the concept of outcome-based contracting (OBC) as the mechanism for firms to focus on delivering value-in-use, and as the driver for value co-creation as the firm would need to jointly deliver outcomes with the customer. The paper analyses two OBC-type contracts between the UK Ministry of Defence and two of its industrial partners. We find that in delivering to outcomes and achieving value-in-use, the state-dependent nature of value in usage „pushes back‟ into the organization, requiring the firm to re-evaluate the way they are structured to receive changes from customer state-dependencies so as to deliver a better service. Our analysis presents seven generic attributes of value co-creation (AVCs) essential for the capability to deliver value-in-use. These are behavioral alignment, process alignment, congruence in customer expectations, congruence in firm expectations, empowerment and perceived control, behavioral transformation, and complementary competencies. The attributes discovered through qualitative data were matched with previous academic literature and operationalized and a measurement instrument was developed. The instrument was then validated by performing an exploratory and second order confirmatory factor analysis.This research was made possible through the joint funding of the Engineering & Physical Science Research Council (UK) and BAE Systems on the Support Service Solutions: Strategy & Transition (S4T) project consortium led by the University of Cambridge. The authors gratefully acknowledge the staff of BAE Systems and MBDA as well as members of the ADAPT IPT, 16th Regiment, ATTAC IPT, MoD and the RAF who have all contributed substantially towards this research

    Component Location and the Role of Trading in Large Scale Distributed Systems

    Get PDF

    Absorption of Vector Dark Matter Beyond Kinetic Mixing

    Get PDF
    Massive vector particles are minimal dark matter candidates that motivate a wide range of laboratory searches, primarily exploiting a postulated kinetic mixing with the photon. However, depending on the high energy field content, the dominant vector dark matter (VDM) coupling to visible particles may arise at higher operator dimension, motivating efforts to predict direct detection rates for more general interactions. Here we present the first calculation of VDM absorption through its coupling to electron electric (EDM) or magnetic (MDM) dipole moments, which can be realized in minimal extensions to the Standard Model and yield the observed abundance through a variety of mechanisms across the eV\,-\,MeV mass range. We compute the absorption rate of the MDM and EDM models for a general target, and then derive direct detection constraints from targets currently in use: Si and Ge crystals and Xe and Ar atoms. We find that current experiments are already sensitive to VDM parameter space corresponding to a cosmological freeze-in scenario, and future experiments will be able to completely exclude MDM and EDM freeze-in models with reheat temperatures below the electroweak scale. Additionally, we find that while constraints on the MDM interaction can be related to constraints on axion-like particles, the same is not true for the EDM model, so the latter absorption rate must be computed from first principles. To achieve this, we update the publicly available program EXCEED-DM to perform these new calculations.Comment: 23 pages, 3 figures; v2: updated to match published versio

    Algebraic specifications and refinement for component-based development using RAISE

    Get PDF
    There are two main activities in Component-Based Development: component development, where we build libraries for general use, and component integration, where we assemble an application from existing components. In this work, we analyze how to apply algebraic specifications with refinement to component development. So we restrict our research to the use of modules that are described as class expressions in a formal specification language, and we present several refinement steps for component development, introducing in each one design decisions and implementation details. This evolution starts from the initial specification of a component as an abstract module, and finishes with the final deployment as fully implemented code. The usage of formal tools helps to assure the correctness of each step, and provides the ground to introduce complementarytechniques, such as bisimulations, for the process of component integration.Facultad de Informátic

    Push-Button Tools for Application Developers, Full Formal Verification for Component Vendors

    Get PDF
    Software developers have varying abilities and develop software with differing reliability requirements. Sometimes reliability is critical and the developers have the mathematical capabilities to perform interactive theorem proving but this is not usually the case. We believe that most software developers need easy to use tools such as run-time assertion checkers and extended static checkers that can help them produce more reliable application-specific code cheaply. However, these lightweight approaches are not sufficient to allow the safe reuse of software components. To safely reuse software components we need comprehensive descriptions and assurances of correctness. These requirements can be provided for by full formal verification with the additional costs justified by the economies of scale. Our Omnibus verification tool provides integrated support for all these different types of verification. This paper illustrates these concepts through a sorting implementation

    A Hierarchical Model of Design Knowledge

    Get PDF
    Despite the central role of knowledge in design, there is a dearth of research on the typology, intrinsic structure and composition of design knowledge. This results in an indeterminate epistemological picture of design outcomes. To address the need for effective conceptualizations, I propose a hierarchical model of design knowledge, which stratifies the different bodies of knowledge into ranked levels. I illustrate some of the benefits of the model and compare it with existing hierarchical models of knowledge in non-design fields of inquiry
    corecore