9,030 research outputs found

    Hardware-Assisted Secure Computation

    Get PDF
    The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even though this is conceptually the simplest and most general solution. Thus, current protocols involve only the direct players---we call such protocols self-reliant. They often use blinded boolean circuits, which has several sources of overhead, some due to the circuit representation and some due to the blinding. However, secure coprocessors like the IBM 4758 have actual security properties similar to ideal TTPs. They also have little RAM and a slow CPU.We call such devices Tiny TTPs. The availability of real tiny TTPs opens the door for a different approach to SMC problems. One major challenge with this approach is how to execute large programs on large inputs using the small protected memory of a tiny TTP, while preserving the trust properties that an ideal TTP provides. In this thesis we have investigated the use of real TTPs to help with the solution of SMC problems. We start with the use of such TTPs to solve the Private Information Retrieval (PIR) problem, which is one important instance of SMC. Our implementation utilizes a 4758. The rest of the thesis is targeted at general SMC. Our SMC system, Faerieplay, moves some functionality into a tiny TTP, and thus avoids the blinded circuit overhead. Faerieplay consists of a compiler from high-level code to an arithmetic circuit with special gates for efficient indirect array access, and a virtual machine to execute this circuit on a tiny TTP while maintaining the typical SMC trust properties. We report on Faerieplay\u27s security properties, the specification of its components, and our implementation and experiments. These include comparisons with the Fairplay circuit-based two-party system, and an implementation of the Dijkstra graph shortest path algorithm. We also provide an implementation of an oblivious RAM which supports similar tiny TTP-based SMC functionality but using a standard RAM program. Performance comparisons show Faerieplay\u27s circuit approach to be considerably faster, at the expense of a more constrained programming environment when targeting a circuit

    THE USE OF SIMULATION TO EVALUATE AND ENHANCE THE PERFORMANCE OF PASSPORTS AND CIVIL AFFAIRS SECTOR

    Get PDF
    In this thesis, the proposed project intends to study the use of Decision Support Systems in simulating Gaza Civil Affairs and Passports Directorate (GCAPD) through identifying the current environment, analyzing the status, and proposing a new system using simulation to determine the optimal number of service providers for the system in order to reduce the postponement of the public services

    Continuing education as value creation. Towards a new orientation beyond market logic

    Get PDF
    The continuing education sector explicitly regards itself as serving the goals of lifelong learning. In fact, however, it is oriented towards the market and measures its success according to the sales of its products. The article analyses this market orientation from the perspectives of educational sociology and discourse theory and illustrates its consequences using examples from the Swiss continuing education market. The author develops an alternative approach whereby continuing education is measured according to the value it creates for individuals and society. Here, a connection is made with economic value creation theory, enhanced by sociological dimensions of the recognition and valorisation of education. This enhanced value creation concept shows how continuing education generates values, where these values are recognised, in what contexts they are valorised and what players and discourses are involved. The author also outlines a procedure for value creation analysis and, using two continuing education programmes as examples, illustrates the findings that value creation analysis can generate. On this basis, the author calls for a reorientation of continuing education that transcends the limitations of market logic. (DIPF/Orig.

    Blockchain in Education

    Get PDF
    This report introduces the fundamental principles of the Blockchain focusing on its potential for the education sector. It explains how this technology may both disrupt institutional norms and empower learners. It proposes eight scenarios for the application of the Blockchain in an education context, based on the current state of technology development and deployment.JRC.B.4-Human Capital and Employmen

    Organizational Learning Supported by Reference Architecture Models: Industry 4.0 Laboratory Study

    Get PDF
    The wave of the fourth industrial revolution (Industry 4.0) is bringing a new vision of the manufacturing industry. In manufacturing, one of the buzzwords of the moment is "Smart production". Smart production involves manufacturing equipment with many sensors that can generate and transmit large amounts of data. These data and information from manufacturing operations are however not shared in the organization. Therefore the organization is not using them to learn and improve their operations. To address this problem, the authors implemented in an Industry 4.0 laboratory an instance of an emerging technical standard specific for the manufacturing industry. Global manufacturing experts consider the Reference Architecture Model Industry 4.0 (RAMI4.0) as one of the corner stones for the implementation of Industry 4.0. The instantiation contributed to organizational learning in the laboratory by collecting and sharing up-to-date information concerning manufacturing equipment. This article discusses and generalizes the experience and outlines future research directions

    Educational Policies Committee Agenda, February 4, 2021

    Get PDF
    Subcommittee Reports Curriculum Subcommittee Academic Standards Subcommittee General Education Subcommittee Other Business Missing course descriptions (missing descriptions/examples) Institutional Certificate

    The Transfer Playbook: Essential Practices For Two- And Four-year Colleges

    Get PDF
    Recognizing the critical need to help millions of community college students failed by current transfer practices and policies.  A new report provides a detailed guide for two- and four-year colleges on how to improve bachelor's degree outcomes for students who start at community college.Every year, millions of students aiming to attain a bachelor's degree attend community colleges because of their affordability and accessibility. Most will not realize their goals. While the vast majority of students report they want to earn a bachelor's degree, only 14 percent of degree-seeking students achieve that goal within six years, according to recent research from CCRC, Aspen, and the National Student Clearinghouse Research Center. The odds are worse for low-income students, first-generation college students, and students of color—those most likely to start at a community college
    corecore