3,391 research outputs found

    2 P2P or Not 2 P2P?

    Full text link
    In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.Comment: 6 pages, 1 figur

    MOVING TOWARD NEUTRALITY: THE ESTABLISHMENT CLAUSE AND AMERICA’S HISTORIC RELIGIOUS PLACES

    Get PDF
    The Establishment Clause of the First Amendment prevents the government from establishing or directly aiding religion. Over the past thirty years, the opinion of the Supreme Court has shifted from a policy of strict separation between church and state to a position of neutrality. Under this policy, one religion is not favored over another and no distinction is made between religious and non-religious groups in secular issues involving aid unspecific to religious worship. This move toward neutrality has directly affected the eligibility of historic active religious places to receive federal funding for historic preservation and conservation. The Supreme Court has ruled that the religious activity of an institution cannot be assumed to be inextricably tied to its secular activity; that connection must be proved. While this reasoning lends itself to educational challenges, it leaves many questions for historic preservation grants, in which it is more difficult to discern the religious from the secular. Can a building be separated from its use? What if the use is divided between the religious and the secular? The site management of these historic religious properties shows a growing trend toward the professionalizing of secular non-profit organizations to navigate these questions and provide a clear public benefit

    Towards Tamper-Evident Storage on Patterned Media

    Get PDF
    We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by out-of-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irreversibly by precise local heating. We discuss the main issues of designing a tamper-evident storage device and file system using the properties of the medium

    MoPS: A Modular Protection Scheme for Long-Term Storage

    Full text link
    Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes that ensure security even in the long-term, i.e. beyond the lifetime of keys, certificates, and cryptographic primitives. However, all current solutions fail to provide optimal performance for different application scenarios. Thus, in this work, we present MoPS, a modular protection scheme to ensure authenticity and integrity for data stored over long periods of time. MoPS does not come with any requirements regarding the storage architecture and can therefore be used together with existing archiving or storage systems. It supports a set of techniques which can be plugged together, combined, and migrated in order to create customized solutions that fulfill the requirements of different application scenarios in the best possible way. As a proof of concept we implemented MoPS and provide performance measurements. Furthermore, our implementation provides additional features, such as guidance for non-expert users and export functionalities for external verifiers.Comment: Original Publication (in the same form): ASIACCS 201

    Biopiracy <i>versus </i>one-world medicine – from colonial relicts to global collaborative concepts

    Get PDF
    Background: Practices of biopiracy to use genetic resources and indigenous knowledge by Western companies without benefit-sharing of those, who generated the traditional knowledge, can be understood as form of neocolonialism.Hypothesis: : The One-World Medicine concept attempts to merge the best of traditional medicine from developing countries and conventional Western medicine for the sake of patients around the globe.Study design: Based on literature searches in several databases, a concept paper has been written. Legislative initiatives of the United Nations culminated in the Nagoya protocol aim to protect traditional knowledge and regulate benefit-sharing with indigenous communities. The European community adopted the Nagoya protocol, and the corresponding regulations will be implemented into national legislation among the member states. Despite pleasing progress, infrastructural problems of the health care systems in developing countries still remain. Current approaches to secure primary health care offer only fragmentary solutions at best. Conventional medicine from industrialized countries cannot be afforded by the impoverished population in the Third World. Confronted with exploding costs, even health systems in Western countries are endangered to burst. Complementary and alternative medicine (CAM) is popular among the general public in industrialized countries, although the efficacy is not sufficiently proven according to the standards of evidence-based medicine. CAM is often available without prescription as over-the-counter products with non-calculated risks concerning erroneous self-medication and safety/toxicity issues. The concept of integrative medicine attempts to combine holistic CAM approaches with evidence-based principles of conventional medicine.Conclusion: To realize the concept of One-World Medicine, a number of standards have to be set to assure safety, efficacy and applicability of traditional medicine, e.g. sustainable production and quality control of herbal products, performance of placebo-controlled, double-blind, randomized clinical trials, phytovigilance, as well as education of health professionals and patients

    Prochlo: Strong Privacy for Analytics in the Crowd

    Full text link
    The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)---for performing such monitoring with high utility while also protecting user privacy. The ESA design, and its Prochlo implementation, are informed by our practical experiences with an existing, large deployment of privacy-preserving software monitoring. (cont.; see the paper
    corecore