19,585 research outputs found

    Automatic vs Manual Provenance Abstractions: Mind the Gap

    Full text link
    In recent years the need to simplify or to hide sensitive information in provenance has given way to research on provenance abstraction. In the context of scientific workflows, existing research provides techniques to semi automatically create abstractions of a given workflow description, which is in turn used as filters over the workflow's provenance traces. An alternative approach that is commonly adopted by scientists is to build workflows with abstractions embedded into the workflow's design, such as using sub-workflows. This paper reports on the comparison of manual versus semi-automated approaches in a context where result abstractions are used to filter report-worthy results of computational scientific analyses. Specifically; we take a real-world workflow containing user-created design abstractions and compare these with abstractions created by ZOOM UserViews and Workflow Summaries systems. Our comparison shows that semi-automatic and manual approaches largely overlap from a process perspective, meanwhile, there is a dramatic mismatch in terms of data artefacts retained in an abstracted account of derivation. We discuss reasons and suggest future research directions.Comment: Preprint accepted to the 2016 workshop on the Theory and Applications of Provenance, TAPP 201

    Resilient planning for sporting mega-events: designing and managing safe and secure urban places for London 2012 and beyond

    Get PDF
    Since the 1960s both regeneration and security have been prominent themes in Olympic planning. However, this paper argues that the prominence given to post event 'legacies' in London's bid to host the 2012 Summer Games has fomented a merger of these hitherto distinct ambitions oriented around notions of 'resilience'. In addition to identifying this merger, based on analysis of planning for the 2012 Games the paper sets out its component features and considers a range of key implications. These include the accommodation of Olympic security amid shifting national security arrangements and, at a local level, the impact and importance of the 2011 London riots on Olympic safety and security processes. Organised over four areas of discussion - the first three comprising of the coupling of spatial strategies of resilient planning and design with concerns for security; the temporal framework of such approaches; analysis of the altered physical and institutional landscape of London ahead of the 2012 Olympic Games - the paper concludes by identifying and discussing the ways in which urban rejuvenation and securitisation which are increasingly being combined into resilient designs and master plans in the Olympic context and, crucially, standardised, exported and transferred to new urban hosts of similar events

    SGXIO: Generic Trusted I/O Path for Intel SGX

    Full text link
    Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well. To overcome this dependency, Intel introduced SGX, which allows to protect application code against a subverted or malicious OS by running it in a hardware-protected enclave. However, SGX lacks support for generic trusted I/O paths to protect user input and output between enclaves and I/O devices. This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I/O devices. To achieve this, SGXIO combines the benefits of SGX's easy programming model with traditional hypervisor-based trusted path architectures. Moreover, SGXIO can tweak insecure debug enclaves to behave like secure production enclaves. SGXIO surpasses traditional use cases in cloud computing and makes SGX technology usable for protecting user-centric, local applications against kernel-level keyloggers and likewise. It is compatible to unmodified operating systems and works on a modern commodity notebook out of the box. Hence, SGXIO is particularly promising for the broad x86 community to which SGX is readily available.Comment: To appear in CODASPY'1
    corecore