1,140 research outputs found

    Formal analysis of confidentiality conditions related to data leakage

    Get PDF
    The size of the financial risk, the social repercussions and the legal ramifications resulting from data leakage are of great concern. Some experts believe that poor system designs are to blame. The goal of this thesis is to use applied formal methods to verify that data leakage related confidentiality properties of system designs are satisfied. This thesis presents a practically applicable approach for using Banks's confidentiality framework, instantiated using the Circus notation. The thesis proposes a tool-chain for mechanizing the application of the framework and includes a custom tool and the Isabelle theorem prover that coordinate to verify a given system model. The practical applicability of the mechanization was evaluated by analysing a number of hand-crafted systems having literature related confidentiality requirements. Without any reliable tool for using BCF or any Circus tool that can be extended for the same purpose, it was necessary to build a custom tool. Further, a lack of literature related descriptive case studies on confidentiality in systems compelled us to use hand-written system specifications with literature related confidentiality requirements. The results of this study show that the tool-chain proposed in this thesis is practically applicable in terms of time required. Further, the efficiency of the proposed tool-chain has been shown by comparing the time taken for analysing a system both using the mechanised approach as well as the manual approach

    Integrating Information Flow Analysis in Unifying Theories of Programming

    Get PDF
    This research is supported by the China National R&D Key Research Program (2019YFB1705703) and the In-terdisciplinary Program of SJTU, Shanghai, China (No. YG2019ZDA07).Postprin

    A State of the Art Review of Geodemographics and their Applicability to the Higher Education Market

    Get PDF

    UTP By Example : Designs

    Get PDF

    In crime's archive: The cultural afterlife of criminal evidence

    Full text link
    This article explores the cultural afterlife of criminal evidence. During the criminal trial, strict rules govern the collection, admission and interpretation of evidence at trial. However, after the conclusion of the trial, this material returns to a notional 'archive' and is sometimes used by artists, scholars, curators and others, but subject to no rules or standards. This article examines a range of instances in which criminal evidence has been used post-trial, and proposes a jurisprudence of sensitivity for responding to the harm that is sometimes done when criminal evidence leads a cultural afterlife. © The Author 2013. Published by Oxford University Press on behalf of the Centre for Crime and Justice Studies (ISTD). All rights reserved

    VERTEBRATE PESTS OF AGRICULTURE, FORESTRY AND PUBLIC LANDS 1997 ANNUAL MEETING

    Get PDF
    Table of Contents . I 1997 Officers . . 1 Proposed Agenda . 2 Minutes . 4 Number and title of the regional project . 4 Location and dates of the meeting . 4 Participants/attendees • 4 Adopted agenda . 5 Action items/assigned responsibilities/deadlines/target dates . 8 Summary of the discussions . . 8 Convening of sessions . 8 Business meeting . 9 Final activities. . 13 General discussions . . 13 Participants/Attendees. . 15 Abstracts . 19 Sterner, Ray et al . 19 New approaches to reducing gnawing and digging behaviors in the northern pocket gopher Sullins, Monty . 20 A comparison of zinc phosphide and strychnine oat baits for the control of the northern pocket gopher Askham, Leonard . 21 Efficacy of Turf Shield® Repellent to reduce goose and duck use of grass areas adjacent to ponds, lakes and rivers Nolte, Dale . 22 Efficacy of selected commercial repellents to inhibit deer browsing Witmer, Gary & Brian Moser. . . 24 The effects of wild and domestic ungulate grazing on the vegetation, birds, and small mammals on Bridge Creek Wildlife Area, northeastern Oregon Van Deelen, Timothy . . 26 Deer-northern white cedar interactions and implications for management in conifer swamp deeryards of the Great Lakes Region Wiggers, Ernie et al. . . 27 Use of sharpshooting, firearms hunting, and hunting to reduce deer overabundance in urban areas Virchow, Dallas . 29 Teaching with drama, Making wildlife damage management come alive Simmons, Gary & John Steuber . 31 California trap initiative - status and strategies Chandler, Monte . 33 Tools and techniques use in wildlife damage management Giusti, Greg . . 35 Dusky-footed woodrats and redwoods: Habitat relationships, responses to silvicultural prescriptions and damage impacts McCann, Geraldine & George Matschke . 36 Chlorophacinone and diphacinone standard mouse laboratory tests Supplementary Materials: Status of USDA/APHISreregistrationslregistrations (K. Fagerstone)· ... 2 pp. . 3

    The Cowl - v.37 - n.15 - Feb 9, 1983

    Get PDF
    The Cowl - student newspaper of Providence College. Volume 37 - No. 15 - February 9, 1983. 12 pages

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures
    • …
    corecore