6,832 research outputs found

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Southern Adventist University Undergraduate Catalog 2023-2024

    Get PDF
    Southern Adventist University\u27s undergraduate catalog for the academic year 2023-2024.https://knowledge.e.southern.edu/undergrad_catalog/1123/thumbnail.jp

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    A Simulation Environment for enhancing the student experience in advanced networking concepts

    Get PDF
    Several subjects in Computer science necessitate practical and realistic classes in addition to supporting the theoretical underpinning taught to the students. In various subjects’ practical exposure & skill is imperative to meet the industry requirements. However, educational establishments can't provide an out-and-out environment for every student to practice. Providing an appropriate Lab for apprentices that bestows desired exposure and feel of a real Network has been a challenging task for every educational establishment. Virtual Labs have been a major milestone and are effectively implemented in numerous colleges and universities throughout the world. In this article, the author is providing a complete setup and functionality of Implementing Virtual Private Networks using virtual Labs to reflect a more realistic and appropriate Networking environment for instructional and educational purposes. Fresh graduates or Diploma holders rarely have practical exposure and experience in deploying and implementing VPNs. Establishing a Virtual Private Network is a cumbersome job, and lack of practical exposure makes it even difficult for a fresher to establish one exclusively for the employer. The Author is providinga guideline for the users so that they can establish Virtual Private Networks using virtual machines. Hencepresenting an environment wherein students can have numerous deployments of VPNs with different features. The students gain the required exposure and develop an understanding of Virtual Private Networks meticulously and pragmatically

    TRANSPARENCY AS A TOOL: SECURING COLLABORATIVE APPROACHES TO FEDERAL HOMELAND SECURITY FUNDING IN THE LOS ANGELES AREA

    Get PDF
    The Los Angeles Area Urban Area Security Initiative (LAA UASI) is a federal grant program that takes a regional approach to grant projects that improve safety and security in Los Angeles. The research conducted for this thesis aimed to contribute to ongoing efforts to enhance the LAA UASI’s safety, provide a framework for collaborative networks, and create a positive environment with real-time information for managing large-scale incidents, including natural and human-made disasters. The research found that the LAA UASI has significantly enhanced the Los Angeles community’s preparedness and response capabilities and identified some areas for improvement. After analyzing best practices from many sectors, including private industry, public safety, the energy sector, not-for-profit governance, and corporate business, this thesis offers several recommendations for future implementation of the program to enhance overall collaboration and cooperation—the bridge to building strong networks of partners and keeping American cities safe. Overall, this thesis lends valuable insights and recommendations for decision-makers working to improve the safety and security of the Los Angeles community.Civilian, Los Angeles City Fire DepartmentApproved for public release. Distribution is unlimited

    2023-2024 Catalog

    Get PDF
    The 2023-2024 Governors State University Undergraduate and Graduate Catalog is a comprehensive listing of current information regarding:Degree RequirementsCourse OfferingsUndergraduate and Graduate Rules and Regulation

    Threshold Encrypted Mempools: Limitations and Considerations

    Full text link
    Encrypted mempools are a class of solutions aimed at preventing or reducing negative externalities of MEV extraction using cryptographic privacy. Mempool encryption aims to hide information related to pending transactions until a block including the transactions is committed, targeting the prevention of frontrunning and similar behaviour. Among the various methods of encryption, threshold schemes are particularly interesting for the design of MEV mitigation mechanisms, as their distributed nature and minimal hardware requirements harmonize with a broader goal of decentralization. This work looks beyond the formal and technical cryptographic aspects of threshold encryption schemes to focus on the market and incentive implications of implementing encrypted mempools as MEV mitigation techniques. In particular, this paper argues that the deployment of such protocols without proper consideration and understanding of market impact invites several undesired outcomes, with the ultimate goal of stimulating further analysis of this class of solutions outside of pure cryptograhic considerations. Included in the paper is an overview of a series of problems, various candidate solutions in the form of mempool encryption techniques with a focus on threshold encryption, potential drawbacks to these solutions, and Osmosis as a case study. The paper targets a broad audience and remains agnostic to blockchain design where possible while drawing from mostly financial examples
    • …
    corecore