833 research outputs found

    Notes on Theory of Distributed Systems

    Full text link
    Notes for the Yale course CPSC 465/565 Theory of Distributed Systems

    Koch Industries, Inc. Strategie Corporate Research Report

    Get PDF
    [Excerpt] With its 2005 purchase of paper giant Georgia-Pacific, Koch Industries became the largest privately-held corporation in North America. Originally started as an oil production and refining firm in the first half of the twentieth century, Koch now has major operations in petroleum, chemicals, energy, fibers and polymers, minerals, fertilizers, chemical technology equipment, forest and consumer products, ranching, trading, and securities and finance. The company, based in Wichita, Kansas, employs 80,000 people in sixty countries worldwide. Koch’s oil operations are run primarily through the Flint Hills Resources family of subsidiaries, which has a production capacity of about 800,000 barrels of crude oil daily. Another one of Koch’s major ventures, synthetic textiles, operates through the company’s wholly-owned subsidiary, INVISTA, which produces both consumer and commodity textiles. Koch’s newest project, forest and consumer products, operates through Georgia-Pacific, which remains an independent but wholly-owned subsidiary of Koch Industries

    A static analysis framework for security properties in mobile and cryptographic systems

    Get PDF
    We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the 7r-calculus and its cryptographic extension, the spi calculus. The framework is composed from three components: First, standard denotational semantics of the 7r-calculus and the spi calculus are constructed based on domain theory. The resulting model is sound and adequate with respect to transitions in the operational semantics. The standard semantics is then extended correctly to non-uniformly capture the property of term substitution, which occurs as a result of communications and successful cryptographic operations. Finally, the non-standard semantics is abstracted to operate over finite domains so as to ensure the termination of the static analysis. The safety of the abstract semantics is proven with respect to the nonstandard semantics. The results of the abstract interpretation are then used to capture breaches of the secrecy and authenticity properties in the analysed systems. Two initial prototype implementations of the security analysis for the 7r-calculus and the spi calculus are also included in the thesis. The main contributions of this thesis are summarised by the following. In the area of denotational semantics, the thesis introduces a domain-theoretic model for the spi calculus that is sound and adequate with respect to transitions in the structural operational semantics. In the area of static program analysis, the thesis utilises the denotational approach as the basis for the construction of abstract interpretations for infinite systems modelled by the 7r-calculus and the spi calculus. This facilitates the use of computationally significant mathematical concepts like least fixed points and results in an analysis that is fully compositional. Also, the thesis demonstrates that the choice of the term-substitution property in mobile and cryptographic programs is rich enough to capture breaches of security properties, like process secrecy and authenticity. These properties are used to analyse a number of mobile and cryptographic protocols, like the file transfer protocol and the Needham-Schroeder, SPLICE/AS, Otway-Rees, Kerberos, Yahalom and Woo Lam authentication protocols

    A Holistic Approach to Functional Safety for Networked Cyber-Physical Systems

    Get PDF
    Functional safety is a significant concern in today's networked cyber-physical systems such as connected machines, autonomous vehicles, and intelligent environments. Simulation is a well-known methodology for the assessment of functional safety. Simulation models of networked cyber-physical systems are very heterogeneous relying on digital hardware, analog hardware, and network domains. Current functional safety assessment is mainly focused on digital hardware failures while minor attention is devoted to analog hardware and not at all to the interconnecting network. In this work we believe that in networked cyber-physical systems, the dependability must be verified not only for the nodes in isolation but also by taking into account their interaction through the communication channel. For this reason, this work proposes a holistic methodology for simulation-based safety assessment in which safety mechanisms are tested in a simulation environment reproducing the high-level behavior of digital hardware, analog hardware, and network communication. The methodology relies on three main automatic processes: 1) abstraction of analog models to transform them into system-level descriptions, 2) synthesis of network infrastructures to combine multiple cyber-physical systems, and 3) multi-domain fault injection in digital, analog, and network. Ultimately, the flow produces a homogeneous optimized description written in C++ for fast and reliable simulation which can have many applications. The focus of this thesis is performing extensive fault simulation and evaluating different functional safety metrics, \eg, fault and diagnostic coverage of all the safety mechanisms

    The Nation’s Imprint: Demographic Engineering and the Change of Toponymes in Republican Turkey

    Get PDF
    This paper discusses demographic engineering and the renaming of places as closely interrelated policies of nationalising states seeking to increase their hold over contested territories. Such policies comprise destructive –deportation, ethnic cleansing, population exchange– as well as constructive aspects, such as the establishment of national institutions, and the creation of narratives, foundational myths and toponymes. It argues that emerging nation-states in Southeast Europe in the late nineteenth and early twentieth century evicted undesired ethno-religious groups and projected their national visions of time and space on their newly acquired territories. This ‘Hellenisation’, ‘Bulgarianisation’ or ‘Turkification’ was achieved, inter alia, by the destruction of the status quo ex ante that is the pre-national, heterogeneous toponymical order and by the construction of a system of place names reflecting the nascent national order of time and space. Within this context, the case of Turkey between 1915 and 1990 is particularly insightful as it illustrates the causal relationship between demographic engineering and renaming places, highlights the indispensable role of a semi-autonomous bureaucratic regime and exposes the power and the constraints of state-directed efforts imagining a purely ‘national’ order of things

    Assessing the security of hardware-assisted isolation techniques

    Get PDF

    From sadomasochism to BDSM : rethinking object relations theorizing through queer theory and sex-positive feminism

    Get PDF
    This theoretical thesis explores the phenomenon of BDSM. BDSM is a type of consensual erotic experience that covers a wide range of interactions between or among people. Referencing the compound acronym BDSM, these interactions encompass: bondage and discipline; dominance and submission; and sadism and masochism. This project investigates psychoanalytic conceptualizations of BDSM, often called sadomasochism in analytic literature. In particular, object relations theory conceptualizations of BDSM are explored. Object relations theorists have tended to identify sadomasochism as pathology. This thesis explores and uses queer theory and sex-positive feminism to analyze two important object relations authors\u27 writings on sadomasochism (i.e., Otto Kernberg and Jessica Benjamin). Additionally, a history of sadomasochism\u27s entry into the psychological lexicon is given; its inclusion in the Diagnostic and Statistical Manual of Mental Disorders is discussed; the findings of empirical research on BDSM are reviewed; and discrimination against BDSM practitioners—including adverse experiences in psychotherapy—is described. Through this analysis, problems with object relations pathological framework regarding sadomasochism are discussed, and new adaptive object relations conceptualizations of BDSM are offered. Implications for clinical social work theory, research, and practice concerning BDSM and its practitioners are presented
    corecore