815 research outputs found

    Tackling Universal Properties of Minimal Trap Spaces of Boolean Networks

    Full text link
    Minimal trap spaces (MTSs) capture subspaces in which the Boolean dynamics is trapped, whatever the update mode. They correspond to the attractors of the most permissive mode. Due to their versatility, the computation of MTSs has recently gained traction, essentially by focusing on their enumeration. In this paper, we address the logical reasoning on universal properties of MTSs in the scope of two problems: the reprogramming of Boolean networks for identifying the permanent freeze of Boolean variables that enforce a given property on all the MTSs, and the synthesis of Boolean networks from universal properties on their MTSs. Both problems reduce to solving the satisfiability of quantified propositional logic formula with 3 levels of quantifiers (\exists\forall\exists). In this paper, we introduce a Counter-Example Guided Refinement Abstraction (CEGAR) to efficiently solve these problems by coupling the resolution of two simpler formulas. We provide a prototype relying on Answer-Set Programming for each formula and show its tractability on a wide range of Boolean models of biological networks.Comment: Accepted at 21st International Conference on Computational Methods in Systems Biology (CMSB 2023

    The role of community conversations in facilitating local HIV competence: case study from rural Zimbabwe

    Get PDF
    Background This paper examines the potential for community conversations to strengthen positive responses to HIV in resource-poor environments. Community conversations are an intervention method through which local people work with a facilitator to collectively identify local strengths and challenges and brainstorm potential strategies for solving local problems. Methods We conducted 18 community conversations (with six groups at three points in time) with a total of 77 participants in rural Zimbabwe (20% HIV positive). Participants were invited to reflect on how they were responding to the challenges of HIV, both as individuals and in community groups, and to think of ways to better support openness about HIV, kindness towards people living with HIV and greater community uptake of HIV prevention and treatment. Results Community conversations contributed to local HIV competence through (1) enabling participants to brainstorm concrete action plans for responding to HIV, (2) providing a forum to develop a sense of common purpose in relation to implementing these, (3) encouraging and challenging participants to overcome fear, denial and passivity, (4) providing an opportunity for participants to move from seeing themselves as passive recipients of information to active problem solvers, and (5) reducing silence and stigma surrounding HIV. Conclusions Our discussion cautions that community conversations, while holding great potential to help communities recognize their potential strengths and capacities for responding more effectively to HIV, are not a magic bullet. Poverty, poor harvests and political instability frustrated and limited many participants’ efforts to put their plans into action. On the other hand, support from outside the community, in this case the increasing availability of antiretroviral treatment, played a vital role in enabling communities to challenge stigma and envision new, more positive, ways of responding to the epidemic

    On protection in federated social computing systems

    Full text link
    Nowadays, a user may belong to multiple social computing systems (SCSs) in order to benefit from a variety of services that each SCS may provide. To facilitate the sharing of contents across the system boundary, some SCSs provide a mechanism by which a user may “connect ” his accounts on two SCSs. The effect is that contents from one SCS can now be shared to another SCS. Although such a connection feature delivers clear usability advantages for users, it also generates a host of privacy challenges. A notable challenge is that the access control policy of the SCS from which the content originates may not be honoured by the SCS to which the content migrates, because the latter fails to faithfully replicate the protection model of the former. In this paper we formulate a protection model for a fed-eration of SCSs that support content sharing via account connection. A core feature of the model is that sharable con-tents are protected by access control policies that transcend system boundary — they are enforced even after contents are migrated from one SCS to another. To ensure faith-ful interpretation of access control policies, their evaluation involves querying the protection states of various SCSs, us-ing Secure Multiparty Computation (SMC). An important contribution of this work is that we carefully formulate the conditions under which policy evaluation using SMC does not lead to the leakage of information about the protection states of the SCSs. We also study the computational prob-lem of statically checking if an access control policy can be evaluated without information leakage. Lastly, we identify useful policy idioms

    Secure Virtual Machine Migration in Cloud Data Centers

    Get PDF
    While elasticity represents a valuable asset in cloud computing environments, it may bring critical security issues. In the cloud, virtual machines (VMs) are dynamically and frequently migrated across data centers from one host to another. This frequent modification in the topology requires constant reconfiguration of security mechanisms particularly as we consider, in terms of firewalls, intrusion detection/prevention as well as IPsec policies. However, managing manually complex security rules is time-consuming and error-prone. Furthermore, scale and complexity of data centers are continually increasing, which makes it difficult to rely on the cloud provider administrators to update and validate the security mechanisms. In this thesis, we propose a security verification framework with a particular interest in the abovementioned security mechanisms to address the issue of security policy preservation in a highly dynamic context of cloud computing. This framework enables us to verify that the global security policy after the migration is consistently preserved with respect to the initial one. Thus, we propose a systematic procedure to verify security compliance of firewall policies, intrusion detection/prevention, and IPsec configurations after VM migration. First, we develop a process algebra called cloud calculus, which allows specifying network topology and security configurations. It also enables specifying the virtual machines migration along with their security policies. Then, the distributed firewall configurations in the involved data centers are defined according to the network topology expressed using cloud calculus. We show how our verification problem can be reduced to a constraint satisfaction problem that once solved allows reasoning about firewall traffic filtering preservation. Similarly, we present our approach to the verification of intrusion detection monitoring preservation as well as IPsec traffic protection preservation using constraint satisfaction problem. We derive a set of constraints that compare security configurations before and after migration. The obtained constraints are formulated as constraint satisfaction problems and then submitted to a SAT solver, namely Sugar, in order to verify security preservation properties and to pinpoint the configuration errors, if any, before the actual migration of the security context and the virtual machine. In addition, we present case studies for the given security mechanisms in order to show the applicability and usefulness of our framework, and demonstrate the scalability of our approach
    corecore