880 research outputs found

    Arguing security: validating security requirements using structured argumentation

    Get PDF
    This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon claims about domain properties, and a set of informal arguments that justify the claims. Building on our earlier work on trust assumptions and security requirements, we show how using satisfaction arguments assists in clarifying how a system satisfies its security requirements, in the process identifying those properties of domains that are critical to the requirements

    A framework for security requirements engineering

    Get PDF
    This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on assets in the system. These goals are used to derive security requirements in the form of constraints. The system context is described using a problem-centered notation, then this context is validated against the security requirements through construction of a satisfaction argument. The satisfaction argument is in two parts: a formal argument that the system can meet its security requirements, and a structured informal argument supporting the assumptions expressed in the formal argument. The construction of the satisfaction argument may fail, revealing either that the security requirement cannot be satisfied in the context, or that the context does not contain sufficient information to develop the argument. In this case, designers and architects are asked to provide additional design information to resolve the problems

    Limits on radio emission from pulsar wind nebulae

    Get PDF
    We report on a sensitive survey for radio pulsar wind nebulae (PWN) towards 27 energetic and/or high velocity pulsars. Observations were carried out at 1.4 GHz using the Very Large Array and the Australia Telescope Compact Array, and utilised pulsar-gating to search for off-pulse emission. These observing parameters resulted in a considerably more sensitive search than previous surveys, and could detect PWN over a much wider range of spatial scales (and hence ambient densities and pulsar velocities). However, no emission clearly corresponding to a PWN was discovered. Based on these non-detections we argue that the young and energetic pulsars in our sample have winds typical of young pulsars, but produce unobservable PWN because they reside in low density (n approx 0.003 cm^-3) regions of the ISM. However, non-detections of PWN around older and less energetic pulsars can only be explained if the radio luminosity of their winds is less than 1e-5 of their spin-down luminosity, implying an efficiency at least an order of magnitude smaller than that seen for young pulsars.Comment: 9 pages, 3 embedded EPS files. Accepted to MNRA

    Picking battles: The impact of trust assumptions on the elaboration of security requirements

    Get PDF
    This position paper describes work on trust assumptions in the con-text of security requirements. We show how trust assumptions can affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. An example shows how trust assumptions are used by a requirements engineer to help define and limit the scope of analysis and to document the decisions made during the process

    WhatsApp-propriate? A retrospective content analysis of WhatsApp use and potential breaches in confidentiality among a team of doctors at a district hospital, South Africa

    Get PDF
    Background. There has been a steady increase in the use of electronic media and instant messaging among healthcare professionals, where it has been almost universally adopted in the workplace. The use of WhatsApp and its perceived benefits in healthcare have been extensively studied; however, there are concerns regarding the potential for ethical breaches in confidentiality through shared electronic patient information.Objectives. To identify the usage characteristics and incidence of shared patient information with WhatsApp use in a team of medical doctors in an unobserved and unregulated setting.Methods. We conducted a retrospective cross-sectional content analysis of WhatsApp messages (n=3 340) among a team of 20 doctors in a South African district hospital over 6 months. All messages found within this time period were allocated unique identifiers. The text and image messages were thematically grouped into four categories, i.e. clinical care, resource allocation, social and administrative. Messages that contained patient-identifying information were included in the analysis.Results. Of a total of 3 340 messages sent, 220 (6.6%) contained patient-identifying information. Of these, 109 (3.3%) contained non-anonymised patient information, while in 111 (3.3%) messages, the information was anonymised. The likelihood of sharing patient identifiers was proportionally much higher in shared images (odds ratio (OR) 5.1; 95% confidence interval (CI) 3.2 - 8.2; p<0.0001) compared with text messages, and in messages that related to clinical care (OR 9.3; 95% CI 2.2 - 38.8; p=0.0023) compared with those sent for resource allocation, and social or administrative purposes.Conclusions. Non-anonymised patient identifiers were found in 3.3% of messages, constituting the potential for breaching patient confidentiality. While WhatsApp groups have significant utility in co-ordinating aspects of clinical care, resource allocation, as well as social and administrative functions, the safe use of WhatsApp should be promoted to ensure that patient confidentiality is maintained

    Microbiology and atmospheric processes: Biological, physical and chemical characterization of aerosol particles

    Get PDF
    The interest in bioaerosols has traditionally been linked to health hazards for humans, animals and plants. However, several components of bioaerosols exhibit physical properties of great significance for cloud processes, such as ice nucleation and cloud condensation. To gain a better understanding of their influence on climate, it is therefore important to determine the composition, concentration, seasonal fluctuation, regional diversity and evolution of bioaerosols. In this paper, we will review briefly the existing techniques for detection, quantification, physical and chemical analysis of biological particles, attempting to bridge physical, chemical and biological methods for analysis of biological particles and integrate them with aerosol sampling techniques. We will also explore some emerging spectroscopy techniques for bulk and single-particle analysis that have potential for in-situ physical and chemical analysis. Lastly, we will outline open questions and further desired capabilities (e. g., in-situ, sensitive, both broad and selective, on-line, time-resolved, rapid, versatile, cost-effective techniques) required prior to comprehensive understanding of chemical and physical characterization of bioaerosols

    A Broadband Study of the Emission from the Composite Supernova Remnant MSH 11-62

    Full text link
    MSH 11-62 (G291.1-0.9) is a composite supernova remnant for which radio and X-ray observations have identified the remnant shell as well as its central pulsar wind nebula. The observations suggest a relatively young system expanding into a low density region. Here we present a study of MSH 11-62 using observations with the Chandra, XMM-Newton, and Fermi observatories, along with radio observations from the Australia Telescope Compact Array (ATCA). We identify a compact X-ray source that appears to be the putative pulsar that powers the nebula, and show that the X-ray spectrum of the nebula bears the signature of synchrotron losses as particles diffuse into the outer nebula. Using data from the Fermi LAT, we identify gamma-ray emission originating from MSH 11-62. With density constraints from the new X-ray measurements of the remnant, we model the evolution of the composite system in order to constrain the properties of the underlying pulsar and the origin of the gamma-ray emission.Comment: 12 Pages, 12 figures. Accepted for publication in the Astrophysical Journa

    The fading of Cassiopeia A, and improved models for the absolute spectrum of primary radio calibration sources

    Get PDF
    Based on five years of observations with the 40-foot telescope at Green Bank Observatory (GBO), Reichart & Stephens (2000) found that the radio source Cassiopeia A had either faded more slowly between the mid-1970s and late 1990s than Baars et al. (1977) had found it to be fading between the late 1940s and mid-1970s, or that it had rebrightened and then resumed fading sometime between the mid-1970s and mid-1990s, in L band (1.4 GHz). Here, we present 15 additional years of observations of Cas A and Cyg A with the 40-foot in L band, and three and a half additional years of observations of Cas A, Cyg A, Tau A, and Vir A with GBO's recently refurbished 20-meter telescope in L and X (9 GHz) bands. We also present a more sophisticated analysis of the 40-foot data, and a reanalysis of the Baars et al. (1977) data, which reveals small, but non-negligible differences. We find that overall, between the late 1950s and late 2010s, Cas A faded at an average rate of 0.670±0.0190.670 \pm 0.019 %/yr in L band, consistent with Reichart & Stephens (2000). However, we also find, at the 6.3σ\sigma credible level, that it did not fade at a constant rate. Rather, Cas A faded at a faster rate through at least the late 1960s, rebrightened (or at least faded at a much slower rate), and then resumed fading at a similarly fast rate by, at most, the late 1990s. Given these differences from the original Baars et al. (1977) analysis, and given the importance of their fitted spectral and temporal models for flux-density calibration in radio astronomy, we update and improve on these models for all four of these radio sources. In doing so, we additionally find that Tau A is fading at a rate of 0.1020.043+0.0420.102^{+0.042}_{-0.043} %/yr in L band.Comment: 17 pages, 12 figures, accepted to MNRA

    Galaxy And Mass Assembly (GAMA) : galaxy close pairs, mergers and the future fate of stellar mass

    Get PDF
    ASGR acknowledges STFC and SUPA funding that were used to do this work. GAMA is funded by the STFC (UK), the ARC (Australia), the AAO and the participating institutions.We use a highly complete subset of the Galaxy And Mass Assembly II (GAMA-II) redshift sample to fully describe the stellar mass dependence of close pairs and mergers between 10(8) and 10(12)M(circle dot). Using the analytic form of this fit we investigate the total stellar mass accreting on to more massive galaxies across all mass ratios. Depending on how conservatively we select our robust merging systems, the fraction of mass merging on to more massive companions is 2.0-5.6 per cent. Using the GAMA-II data we see no significant evidence for a change in the close pair fraction between redshift z = 0.05 and 0.2. However, we find a systematically higher fraction of galaxies in similar mass close pairs compared to published results over a similar redshift baseline. Using a compendium of data and the function gamma(M) = A(1 + z)(m) to predict the major close pair fraction, we find fitting parameters of A = 0.021 +/- 0.001 and m = 1.53 +/- 0.08, which represents a higher low-redshift normalization and shallower power-law slope than recent literature values. We find that the relative importance of in situ star formation versus galaxy merging is inversely correlated, with star formation dominating the addition of stellar material below M* and merger accretion events dominating beyond M*. We find mergers have a measurable impact on the whole extent of the galaxy stellar mass function (GSMF), manifest as a deepening of the 'dip' in the GSMF over the next similar to Gyr and an increase in M* by as much as 0.01-0.05 dex.Publisher PDFPeer reviewe
    corecore