6,660 research outputs found

    Quantifying leakage in the presence of unreliable sources of information

    Get PDF
    Belief and min-entropy leakage are two well-known approaches to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches founded on Shannon entropy and mutual information, which were shown to provide inadequate security guarantees. In this paper we unify the two concepts in one model so as to cope with the frequent (potentially inaccurate, misleading or outdated) attackers’ side information about individuals on social networks, online forums, blogs and other forms of online communication and information sharing. To this end we propose a new metric based on min-entropy that takes into account the adversary’s beliefs

    Quantitative Analysis of Opacity in Cloud Computing Systems

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Federated cloud systems increase the reliability and reduce the cost of the computational support. The resulting combination of secure private clouds and less secure public clouds, together with the fact that resources need to be located within different clouds, strongly affects the information flow security of the entire system. In this paper, the clouds as well as entities of a federated cloud system are assigned security levels, and a probabilistic flow sensitive security model for a federated cloud system is proposed. Then the notion of opacity --- a notion capturing the security of information flow --- of a cloud computing systems is introduced, and different variants of quantitative analysis of opacity are presented. As a result, one can track the information flow in a cloud system, and analyze the impact of different resource allocation strategies by quantifying the corresponding opacity characteristics

    KEY ISSUES OF COST-BENEFIT METHODOLOGY FOR IRISH INDUSTRIAL POLICY. General Research Series Paper No. 172, 1998

    Get PDF
    Industrial development policy in Ireland has long been characterised by its reliance on both discretionary and non-discretionary incentives. The former includes a range of grants for new investment or expansion projects in manufacturing and certain internationally traded service sectors. The latter features a low rate of corporation profits tax rate applicable (up to now) to essentially the same sectors (though the profits tax rate will soon be unified at a low rate for all sectors). Although, like its predecessor export sales relief, the regime does not discriminate between foreign-owned and indigenous firms, it was probably always envisaged chiefly as a mechanism for inducing an inflow of foreign direct investment. The low tax rate, combined with international tax treaties, is of great advantage to US and other firms with unsheltered foreign tax liabilities; the discretionary grants enable the Irish development agencies to compete with other possible destinations for internationally mobile investment projects. The success of the policy is evidenced by the remarkably high share of foreign-owned companies in manufacturing whether measured by employment (45 per cent) or output (70 per cent)

    Securing Real-Time Internet-of-Things

    Full text link
    Modern embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). Recent developments and new functionality requires real-time embedded devices to be connected to the Internet. This gives rise to the real-time Internet-of-things (RT-IoT) that promises a better user experience through stronger connectivity and efficient use of next-generation embedded devices. However RT- IoT are also increasingly becoming targets for cyber-attacks which is exacerbated by this increased connectivity. This paper gives an introduction to RT-IoT systems, an outlook of current approaches and possible research challenges towards secure RT- IoT frameworks

    Subsurface methane leakage in unconventional shale gas reservoirs : A review of leakage pathways and current sealing techniques

    Get PDF
    The authors would like to thank the School of Engineering at the University of Aberdeen for providing the required facilities to complete this study.Peer reviewedPostprin

    Challenges with Quantifying Tire Road Wear Particles: Recognizing the Need for Further Refinement of the ISO Technical Specification

    Get PDF
    Environmental monitoring data for tire road wear particles are vastly limited compared to those for other microplastics, primarily due to analytical challenges with quantification. Recently, two ISO technical specifications have been released using pyrolysis GC-MS for quantification. However, these methods have major assumptions, including that the content of natural and synthetic rubber in tire tread is constant across formulations and that the pyrolysis products chosen are selective. This study analyzed a wide range of commercially available tires from Australia and Norway, using pyrolysis GC-MS to test these assumptions. The percent mass of synthetic rubber in tires (n = 39) was highly variable, ranging from <0.05 to 28%, when using the ISO-recommended pyrolysis product 4-vinylcyclohexene. The content varied between brands and models, demonstrating that formulations are highly variable and unknown. The styrene butadiene dimer and trimer pyrolysis products were also assessed, and the calculated synthetic rubber content was higher, had an even greater variability, and had no correlation with concentrations calculated using 4-vinylcyclohexene. Using the ISO method has the potential to underreport environmental concentrations of TRWPs by a factor of at least 5, suggesting the specification requires further refinement, and there is an immediate need for large-scale analysis of commercial tire treads and assessments of suitable pyrolysis products.acceptedVersio
    • …
    corecore