421 research outputs found

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

    Full text link
    Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide-range of relational queries. We provide a security definition for database encryption that captures confidentiality based on a notion of equivalence of databases from the adversary's perspective. As a specific application, we adapt an existing algorithm for finding violations of privacy policies to run on logs encrypted under our schemes and observe low to moderate overheads.Comment: CCS 2015 paper technical report, in progres

    Labour Market and Social Policy in Italy: Challenges and Changes. Bertelsmann Policy Brief #2016/02

    Get PDF
    vEight years after the outbreak of the financial crisis, Italy has still to cope with and overcome a plethora of economic and social challenges. On top of this, it faces an unfavourable demographic structure and severe disparities between its northern and southern regions. Some promising reforms have recently been enacted, specifically targeting poverty and social exclusion. However, much more remains to be done on the way towards greater economic stability and widely shared prosperity

    Efficient Large-scale Trace Checking Using MapReduce

    Full text link
    The problem of checking a logged event trace against a temporal logic specification arises in many practical cases. Unfortunately, known algorithms for an expressive logic like MTL (Metric Temporal Logic) do not scale with respect to two crucial dimensions: the length of the trace and the size of the time interval for which logged events must be buffered to check satisfaction of the specification. The former issue can be addressed by distributed and parallel trace checking algorithms that can take advantage of modern cloud computing and programming frameworks like MapReduce. Still, the latter issue remains open with current state-of-the-art approaches. In this paper we address this memory scalability issue by proposing a new semantics for MTL, called lazy semantics. This semantics can evaluate temporal formulae and boolean combinations of temporal-only formulae at any arbitrary time instant. We prove that lazy semantics is more expressive than standard point-based semantics and that it can be used as a basis for a correct parametric decomposition of any MTL formula into an equivalent one with smaller, bounded time intervals. We use lazy semantics to extend our previous distributed trace checking algorithm for MTL. We evaluate the proposed algorithm in terms of memory scalability and time/memory tradeoffs.Comment: 13 pages, 8 figure

    On-Line Monitoring for Temporal Logic Robustness

    Full text link
    In this paper, we provide a Dynamic Programming algorithm for on-line monitoring of the state robustness of Metric Temporal Logic specifications with past time operators. We compute the robustness of MTL with unbounded past and bounded future temporal operators MTL over sampled traces of Cyber-Physical Systems. We implemented our tool in Matlab as a Simulink block that can be used in any Simulink model. We experimentally demonstrate that the overhead of the MTL robustness monitoring is acceptable for certain classes of practical specifications

    Monitoring Partially Synchronous Distributed Systems using SMT Solvers

    Full text link
    In this paper, we discuss the feasibility of monitoring partially synchronous distributed systems to detect latent bugs, i.e., errors caused by concurrency and race conditions among concurrent processes. We present a monitoring framework where we model both system constraints and latent bugs as Satisfiability Modulo Theories (SMT) formulas, and we detect the presence of latent bugs using an SMT solver. We demonstrate the feasibility of our framework using both synthetic applications where latent bugs occur at any time with random probability and an application involving exclusive access to a shared resource with a subtle timing bug. We illustrate how the time required for verification is affected by parameters such as communication frequency, latency, and clock skew. Our results show that our framework can be used for real-life applications, and because our framework uses SMT solvers, the range of appropriate applications will increase as these solvers become more efficient over time.Comment: Technical Report corresponding to the paper accepted at Runtime Verification (RV) 201

    Evolving Discourses on Water Resource Management and Climate Change in the Equatorial Nile Basin

    Get PDF
    Transboundary water resources management in the Equatorial Nile Basin (EQNB) is a politically contested issue. There is a growing body of literature examining water-related discourses which identifies the ability of powerful actors and institutions to influence policy. Concern about the effects of future climate change has featured strongly in research on the Nile River for several decades. It is therefore timely to consider whether and how these concerns are reflected in regional policy documents and policy discourse. This study analyzes discourse framings of water resources management and climate change in policy documents (27, published between 2001 and 2013) and as elicited in interviews (38) with water managers in the EQNB. Three main discursive framings are identified which are present in the discourses on both subjects: a problem-oriented environmental risk frame and two solution-oriented frames, on governance and infrastructure development. Climate change discourse only emerges as a common topic around 2007. The framings found in the water resources management discourse and the climate change discourse are almost identical, suggesting that discursive framings were adopted from the former for use in the latter. We infer that the climate change discourse may have offered a less politically sensitive route to circumvent political sensitivities around water allocation and distribution between riparian countries in the EQNB. However, the climate change discourse does not offer a lasting solution to the more fundamental political dispute over water allocation. Moreover, in cases where the climate change discourse is subsumed within a water resources management discourse, there are dangers that it will not fully address the needs of effective adaptation

    Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things

    Get PDF
    International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous network devices that communicate with their users and the surrounding devices. The secure communications between these devices are still essential even with little or no previous knowledge about each other and regardless of their resource capabilities. This particular context requires appropriate security mechanisms which should be wellsuited for the heterogeneous nature of IoT devices, without pre-sharing a secret key for each secure connection. In this work, we first propose a novel symmetric cipher proxy re-encryption scheme. Such a primitive allows a user to delegate her decryption rights to another with the help of a semi-trusted proxy, but without giving this latter any information on the transmitted messages and the user's secret keys. We then propose AKAPR, an Authenticated Key Agreement mediated by a Proxy Re-encryptor for IoT. The mechanism permits any two highly resource-constrained devices to establish a secure communication with no prior trust relationship. AKAPR is built upon our proposed proxy re-encryption scheme. It has been proved by ProVerif to provide mutual authentication for participants while preserving the secrecy of the generated session key. In addition, the scheme benefits from the lightness of our proxy re-encryption algorithm as it requires no expensive cryptographic operations such as pairing or modular exponentiatio

    Monitoring Time Intervals

    Get PDF
    Run-time checking of timed properties requires to monitor events occurring within a specified time interval. In a distributed setting, working with intervals is complicated due to uncertainties about network delays and clock synchronization. Determining that an interval can be closed - i.e., that all events occurring within the interval have been observed - cannot be done without a delay. In this paper, we consider how an appropriate delay can be determined based on parameters of a monitoring setup, such as network delay, clock skew and clock rate. We then propose a generic scheme for monitoring time intervals, parameterized by the detection delay, and discuss the use of this monitoring scheme to check different timed specifications, including real-time temporal logics and rate calculations

    Taxonomic and functional patterns of macrobenthic communities on a high Arctic shelf: A case study from the East Siberian Sea

    Get PDF
    The Siberian Arctic is one of the regions, where the ongoing climate change is the most evident. There is limited knowledge available on the distribution of macrobenthic communities in the Siberian Arctic, their stability and functional structure. We used data from two latitudinal transects from the East Siberian Sea shelf to describe the distribution of macrobenthic communities as well as to identify the main environmental drivers responsible for the observed patterns. Almost all the studied area was under the direct influence of river runoff. Macrobenthic communities were dominated by the bivalve Portlandia arctica and were generally characterised by low species and functional diversity. We suggest that the observed pattern is a direct consequence of considerable river runoff combined with low primary productivity. The overall pattern of macrobenthic distribution corresponds well with the data obtained in the previous decades, suggesting long-term stability of these communities.publishedVersio
    corecore