1,258 research outputs found

    Chinese Wall Security Policy

    Get PDF
    This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world. Though the policy was well accepted, but the model was incorrect. A decade later, Dr. Lin provided a model in 2003 that meets Brewer & Nash’s Policy. One of the important components in Cloud computing is data center. In order for any company to store data in the center, a trustable security policy model is a must; Chinese wall security policy model will provide this assurance. The heart of the Chinese Wall Security Policy Model is the concept of Conflict of Interest (COI). The concept can be modeled by an anti-reflexive, symmetric and transitive binary relation. In this project, by extending Dr. Lin’s Model, we explore the security issues in the environment of cloud computing and develop a small system of the Chinese Wall Security Model

    A New Distributed Chinese Wall Security Policy Model

    Get PDF
    The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed system) and has been attempted in the past; however the proposed solutions cannot deal with the composite information flows problem (e.g., a malicious Trojan horses problem), caused by the writing access rule imposed to the subject on the objects. In this article, we propose a new CWSP model, based on the access query type of the subject to the objects using the concepts of the CWSP. We have two types of walls placement, the first type consists of walls that are built around the subject, and the second around the object. We cannot find inside each once wall two competing objects\u27 data. We showed that this mechanism is a good alternative to deal with some previous models\u27 limitations. The model is easy to implement in a distributed system (as Cloud-Computing). It is based on the technique of Object Oriented Programming (Can be used in Cloud computing Software as a service SaaS ) or by using the capabilities as an access control in real distributed system

    A Tale of Two Direction Codes in Rat Retrosplenial Cortex: Uncovering the Neural Basis of Spatial Orientation in Complex Space

    Get PDF
    Head direction (HD) cells only become active whenever a rat faces one direction and stay inactive when it faces others, producing a unimodal activity distribution. Working together in a network, HD cells are considered the neural basis supporting a sense of direction. The retrosplenial cortex (RSC) is part of the HD circuit and contains neurons that express multiple spatial signals, including a pattern of bipolar directional tuning – as recently reported in rats exploring a rotationally symmetric two-compartment space. This suggests an unexplored mechanism of the neural compass. In this thesis, I investigated whether the association between the two-way firing symmetry and twofold environment symmetry reveals a general environment symmetry-encoding property of these RSC neurons. I recorded RSC neurons in environments having onefold, twofold and fourfold symmetry. The current study showed that RSC HD cells maintained a consistent global signal, whereas other RSC directional cells showed multi-fold symmetric firing patterns that reflected environment symmetry, not just globally (across all sub-compartments) but also locally (within each sub-compartment). The analyses also showed that the pattern was independent of egocentric boundary vector coding but represented an allocentric spatial code. It means that these RSC cells use environmental cues to organise multiple singular tuning curves which sometimes are combined to form a multidirectional pattern, likely via an interaction with the global HD signal. Thus, both local and global environment symmetry are encoded by local firing patterns in subspaces. This interestingly suggests cognitive mapping and abstraction of space beyond immediate perceptual bounds in RSC. The data generated from this study provides important insights for modelling of direction computation. Taken together, I discuss how having two types of direction codes in RSC may help us to orient more accurately and flexibly in complex and ambiguous space

    The practice of feeling for place: a compendium for an expanded Architecture

    Get PDF
    This research expands the field of architecture through foregrounding the complexity of place. Activating knowing-through-practising I invoke feeling for place as a political, ethical and aesthetic task. An ‘experimental self’ is identified as an agile condition for reflecting on (performing, presenting and writing about) the practice. Locating the work alongside socially engaged art and critical spatial practices the contribution takes two forms: first, a critique of normative architectural procedures and concepts of agency, instrumental design and disciplinarity, and second, a theorised description of the different techniques developed through the practice. Four ‘tactical ways’ of operating are elucidated providing insight into methods for dynamic, temporary modes of place production

    Modeling and Simulation in Engineering

    Get PDF
    The Special Issue Modeling and Simulation in Engineering, belonging to the section Engineering Mathematics of the Journal Mathematics, publishes original research papers dealing with advanced simulation and modeling techniques. The present book, “Modeling and Simulation in Engineering I, 2022”, contains 14 papers accepted after peer review by recognized specialists in the field. The papers address different topics occurring in engineering, such as ferrofluid transport in magnetic fields, non-fractal signal analysis, fractional derivatives, applications of swarm algorithms and evolutionary algorithms (genetic algorithms), inverse methods for inverse problems, numerical analysis of heat and mass transfer, numerical solutions for fractional differential equations, Kriging modelling, theory of the modelling methodology, and artificial neural networks for fault diagnosis in electric circuits. It is hoped that the papers selected for this issue will attract a significant audience in the scientific community and will further stimulate research involving modelling and simulation in mathematical physics and in engineering

    Protecting the infrastructure: 3rd Australian information warfare & security conference 2002

    Get PDF
    The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year\u27s conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations. The papers cover many topics, all within the field of information warfare and its applications, now and into the future. The papers have been grouped into six streams: • Networks • IWAR Strategy • Security • Risk Management • Social/Education • Infrastructur
    • …
    corecore