880 research outputs found
Recommended from our members
Arguing satisfaction of security requirements
This chapter presents a process for security requirements elicitation and analysis,
based around the construction of a satisfaction argument for the security of a
system. The process starts with the enumeration of security goals based on assets
in the system, then uses these goals to derive security requirements in the form of
constraints. Next, a satisfaction argument for the system is constructed, using a
problem-centered representation, a formal proof to analyze properties that can be
demonstrated, and structured informal argumentation of the assumptions exposed
during construction of the argument. Constructing the satisfaction argument can
expose missing and inconsistent assumptions about system context and behavior
that effect security, and a completed argument provides assurances that a system
can respect its security requirements
Arguing security: validating security requirements using structured argumentation
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon claims about domain properties, and a set of informal arguments that justify the claims. Building on our earlier work on trust assumptions and security requirements, we show how using satisfaction arguments assists in clarifying how a system satisfies its security requirements, in the process identifying those properties of domains that are critical to the requirements
A framework for security requirements engineering
This paper presents a framework for security requirements
elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on assets in the system. These goals are used to derive security requirements in the form of constraints. The system context is described using a problem-centered notation, then this context is
validated against the security requirements through construction of a satisfaction argument. The satisfaction argument is in two parts: a formal argument that the system can meet its security requirements, and a structured informal argument supporting the assumptions expressed in the formal argument. The construction
of the satisfaction argument may fail, revealing either that the security requirement cannot be satisfied in the context, or that the context does not contain sufficient information to develop the argument. In this case, designers and architects are asked to provide additional design information to resolve the problems
Limits on radio emission from pulsar wind nebulae
We report on a sensitive survey for radio pulsar wind nebulae (PWN) towards
27 energetic and/or high velocity pulsars. Observations were carried out at 1.4
GHz using the Very Large Array and the Australia Telescope Compact Array, and
utilised pulsar-gating to search for off-pulse emission. These observing
parameters resulted in a considerably more sensitive search than previous
surveys, and could detect PWN over a much wider range of spatial scales (and
hence ambient densities and pulsar velocities). However, no emission clearly
corresponding to a PWN was discovered. Based on these non-detections we argue
that the young and energetic pulsars in our sample have winds typical of young
pulsars, but produce unobservable PWN because they reside in low density (n
approx 0.003 cm^-3) regions of the ISM. However, non-detections of PWN around
older and less energetic pulsars can only be explained if the radio luminosity
of their winds is less than 1e-5 of their spin-down luminosity, implying an
efficiency at least an order of magnitude smaller than that seen for young
pulsars.Comment: 9 pages, 3 embedded EPS files. Accepted to MNRA
Picking battles: The impact of trust assumptions on the elaboration of security requirements
This position paper describes work on trust assumptions in the con-text of security requirements. We show how trust assumptions can affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. An example shows how trust assumptions are used by a requirements engineer to help define and limit the scope of analysis and to document the decisions made during the process
WhatsApp-propriate? A retrospective content analysis of WhatsApp use and potential breaches in confidentiality among a team of doctors at a district hospital, South Africa
Background. There has been a steady increase in the use of electronic media and instant messaging among healthcare professionals, where it has been almost universally adopted in the workplace. The use of WhatsApp and its perceived benefits in healthcare have been extensively studied; however, there are concerns regarding the potential for ethical breaches in confidentiality through shared electronic patient information.Objectives. To identify the usage characteristics and incidence of shared patient information with WhatsApp use in a team of medical doctors in an unobserved and unregulated setting.Methods. We conducted a retrospective cross-sectional content analysis of WhatsApp messages (n=3 340) among a team of 20 doctors in a South African district hospital over 6 months. All messages found within this time period were allocated unique identifiers. The text and image messages were thematically grouped into four categories, i.e. clinical care, resource allocation, social and administrative. Messages that contained patient-identifying information were included in the analysis.Results. Of a total of 3 340 messages sent, 220 (6.6%) contained patient-identifying information. Of these, 109 (3.3%) contained non-anonymised patient information, while in 111 (3.3%) messages, the information was anonymised. The likelihood of sharing patient identifiers was proportionally much higher in shared images (odds ratio (OR) 5.1; 95% confidence interval (CI) 3.2 - 8.2; p<0.0001) compared with text messages, and in messages that related to clinical care (OR 9.3; 95% CI 2.2 - 38.8; p=0.0023) compared with those sent for resource allocation, and social or administrative purposes.Conclusions. Non-anonymised patient identifiers were found in 3.3% of messages, constituting the potential for breaching patient confidentiality. While WhatsApp groups have significant utility in co-ordinating aspects of clinical care, resource allocation, as well as social and administrative functions, the safe use of WhatsApp should be promoted to ensure that patient confidentiality is maintained
Microbiology and atmospheric processes: Biological, physical and chemical characterization of aerosol particles
The interest in bioaerosols has traditionally been linked to health hazards for humans, animals and plants. However, several components of bioaerosols exhibit physical properties of great significance for cloud processes, such as ice nucleation and cloud condensation. To gain a better understanding of their influence on climate, it is therefore important to determine the composition, concentration, seasonal fluctuation, regional diversity and evolution of bioaerosols. In this paper, we will review briefly the existing techniques for detection, quantification, physical and chemical analysis of biological particles, attempting to bridge physical, chemical and biological methods for analysis of biological particles and integrate them with aerosol sampling techniques. We will also explore some emerging spectroscopy techniques for bulk and single-particle analysis that have potential for in-situ physical and chemical analysis. Lastly, we will outline open questions and further desired capabilities (e. g., in-situ, sensitive, both broad and selective, on-line, time-resolved, rapid, versatile, cost-effective techniques) required prior to comprehensive understanding of chemical and physical characterization of bioaerosols
A Broadband Study of the Emission from the Composite Supernova Remnant MSH 11-62
MSH 11-62 (G291.1-0.9) is a composite supernova remnant for which radio and
X-ray observations have identified the remnant shell as well as its central
pulsar wind nebula. The observations suggest a relatively young system
expanding into a low density region. Here we present a study of MSH 11-62 using
observations with the Chandra, XMM-Newton, and Fermi observatories, along with
radio observations from the Australia Telescope Compact Array (ATCA). We
identify a compact X-ray source that appears to be the putative pulsar that
powers the nebula, and show that the X-ray spectrum of the nebula bears the
signature of synchrotron losses as particles diffuse into the outer nebula.
Using data from the Fermi LAT, we identify gamma-ray emission originating from
MSH 11-62. With density constraints from the new X-ray measurements of the
remnant, we model the evolution of the composite system in order to constrain
the properties of the underlying pulsar and the origin of the gamma-ray
emission.Comment: 12 Pages, 12 figures. Accepted for publication in the Astrophysical
Journa
The fading of Cassiopeia A, and improved models for the absolute spectrum of primary radio calibration sources
Based on five years of observations with the 40-foot telescope at Green Bank
Observatory (GBO), Reichart & Stephens (2000) found that the radio source
Cassiopeia A had either faded more slowly between the mid-1970s and late 1990s
than Baars et al. (1977) had found it to be fading between the late 1940s and
mid-1970s, or that it had rebrightened and then resumed fading sometime between
the mid-1970s and mid-1990s, in L band (1.4 GHz). Here, we present 15
additional years of observations of Cas A and Cyg A with the 40-foot in L band,
and three and a half additional years of observations of Cas A, Cyg A, Tau A,
and Vir A with GBO's recently refurbished 20-meter telescope in L and X (9 GHz)
bands. We also present a more sophisticated analysis of the 40-foot data, and a
reanalysis of the Baars et al. (1977) data, which reveals small, but
non-negligible differences. We find that overall, between the late 1950s and
late 2010s, Cas A faded at an average rate of %/yr in L band,
consistent with Reichart & Stephens (2000). However, we also find, at the
6.3 credible level, that it did not fade at a constant rate. Rather,
Cas A faded at a faster rate through at least the late 1960s, rebrightened (or
at least faded at a much slower rate), and then resumed fading at a similarly
fast rate by, at most, the late 1990s. Given these differences from the
original Baars et al. (1977) analysis, and given the importance of their fitted
spectral and temporal models for flux-density calibration in radio astronomy,
we update and improve on these models for all four of these radio sources. In
doing so, we additionally find that Tau A is fading at a rate of
%/yr in L band.Comment: 17 pages, 12 figures, accepted to MNRA
Galaxy And Mass Assembly (GAMA) : galaxy close pairs, mergers and the future fate of stellar mass
ASGR acknowledges STFC and SUPA funding that were used to do this work. GAMA is funded by the STFC (UK), the ARC (Australia), the AAO and the participating institutions.We use a highly complete subset of the Galaxy And Mass Assembly II (GAMA-II) redshift sample to fully describe the stellar mass dependence of close pairs and mergers between 10(8) and 10(12)M(circle dot). Using the analytic form of this fit we investigate the total stellar mass accreting on to more massive galaxies across all mass ratios. Depending on how conservatively we select our robust merging systems, the fraction of mass merging on to more massive companions is 2.0-5.6 per cent. Using the GAMA-II data we see no significant evidence for a change in the close pair fraction between redshift z = 0.05 and 0.2. However, we find a systematically higher fraction of galaxies in similar mass close pairs compared to published results over a similar redshift baseline. Using a compendium of data and the function gamma(M) = A(1 + z)(m) to predict the major close pair fraction, we find fitting parameters of A = 0.021 +/- 0.001 and m = 1.53 +/- 0.08, which represents a higher low-redshift normalization and shallower power-law slope than recent literature values. We find that the relative importance of in situ star formation versus galaxy merging is inversely correlated, with star formation dominating the addition of stellar material below M* and merger accretion events dominating beyond M*. We find mergers have a measurable impact on the whole extent of the galaxy stellar mass function (GSMF), manifest as a deepening of the 'dip' in the GSMF over the next similar to Gyr and an increase in M* by as much as 0.01-0.05 dex.Publisher PDFPeer reviewe
- …