429 research outputs found
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud
not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud
rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud
Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session
ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful context information regarding the network services. The false positives raised by the NIDS analyzing the incoming traffic (which can be either signature- or anomaly-based) are reduced by correlating them with the output anomalies. We designed our architecture for TCP-based network services which have a client/server architecture (such as HTTP). Benchmarks show a substantial reduction of false positives between 50% and 100%
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
In this paper we present an approach for specifying and prioritizing\ud
information security requirements in organizations. It is important\ud
to prioritize security requirements since hundred per cent security is\ud
not achievable and the limited resources available should be directed to\ud
satisfy the most important ones. We propose to link explicitly security\ud
requirements with the organization’s business vision, i.e. to provide business\ud
rationale for security requirements. The rationale is then used as a\ud
basis for comparing the importance of different security requirements.\ud
A conceptual framework is presented, where the relationships between\ud
business vision, critical impact factors and valuable assets (together with\ud
their security requirements) are shown
Indicators of Malicious SSL Connections
Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the unencrypted part of SSL (i.e., the SSL handshake protocol). We provide strong evidence for the strength of our indicators to identify malicious connections by cross-checking on blacklists from professional services. Besides the confirmation of prior research results through our indicators, we also found indications for a potential (not yet blacklisted) botnet on SSL. We consider the analysis of such SSL threats as highly relevant and hope that our findings stimulate the research community to further study this direction. © Springer International Publishing Switzerland 2015
Implants outcome inserted in different sites
Oral rehabilitation by means dental implants has high standards of success. Recently, a new type of two-pieces spiral implants has been introduced in the market. Since few reports focus of the efficacy of this medical device as a reliable tool for oral rehabilitation, here a retrospective study is reported. In the period June-December 2017 one hundred and two spiral fixtures were inserted, half in females and 51 in males. The median age was 56 \ub1 8 (min-max 36-73 years). Forty-eight implants were inserted in upper jawbone and 54 in mandible. Two implants were lost and thus survival rate (SVR) is 99.9%. Then peri-implant bone resorption was used to investigate the clinical success (success rate, SCR) over time. No implants have a crestal bone resorption greater than 1.5 mm in the first year follow up. No studied variable has an effect on clinical outcome. In conclusion the studied implants have high SCR and SVR so that they are good tools for oral rehabilitation
Electron localization and possible phase separation in the absence of a charge density wave in single-phase 1T-VS
We report on a systematic study of the structural, magnetic and transport
properties of high-purity 1T-VS powder samples prepared under high
pressure. The results differ notably from those previously obtained by
de-intercalating Li from LiVS. First, no Charge Density Wave (CDW) is found
by transmission electron microscopy down to 94 K. Though, \textit{ab initio}
phonon calculations unveil a latent CDW instability driven by an acoustic
phonon softening at the wave vector (0.21,0.21,0)
previously reported in de-intercalated samples. A further indication of latent
lattice instability is given by an anomalous expansion of the V-S bond distance
at low temperature. Second, infrared optical absorption and electrical
resistivity measurements give evidence of non metallic properties, consistent
with the observation of no CDW phase. On the other hand, magnetic
susceptibility and NMR data suggest the coexistence of localized moments with
metallic carriers, in agreement with \textit{ab initio} band structure
calculations. This discrepancy is reconciled by a picture of electron
localization induced by disorder or electronic correlations leading to a phase
separation of metallic and non-metallic domains in the nm scale. We conclude
that 1T-VS is at the verge of a CDW transition and suggest that residual
electronic doping in Li de-intercalated samples stabilizes a uniform CDW phase
with metallic properties.Comment: 22 pages, 10 Figures. Full resolution pictures available at
http://journals.aps.org/prb/abstract/10.1103/PhysRevB.89.23512
Recommended from our members
Cavitation erosion behaviour of commercial steel grades used in the design of fluid-machinery
The erosion response under cavitation of different steel grades was assessed by studying the erosion rate, the volume removal, the roughness evolution and the accumulated strain energy. A 20 kHz ultrasonic transducer with a probe diameter of 5 mm and peak-to-peak amplitude of 50 μm was deployed in distilled water to induce damage on the surface of commercial chromium and carbon steel samples. After a relatively short incubation period, cavitation induced the formation of pits, cracks and craters whose features strongly depended on the hardness and composition of the tested steel. AISI 52100 cromium steel showed the best performance and, therefore, it could be a promising design candidate for replacing the existing fluid-machinery materials that operate within cavitating environments
A 3-dimensional transnasal endoscopic journey through the paranasal sinuses and adjacent skull base: a practical and surgery-oriented perspective
An endoscopic approach through the transnasal corridor is currently the treatment of choice in the management of benign sinonasal tumors, cerebrospinal fluid leaks, and pituitary lesions. Moreover, this approach can be considered a valid option in the management of selected sinonasal malignancies extending to the skull base, midline meningiomas, parasellar lesions such as craniopharyngioma and Rathke cleft cyst, and clival lesions such as chordoma and ecchordosis. Over the past decade, strict cooperation between otorhinolaryngologists and neurosurgeons and acquired surgical skills, together with high-definition cameras, dedicated instrumentation, and navigation systems, have made it possible to broaden the indications of endoscopic surgery. Despite these improvements, depth perception, as provided by the use of a microscope, was still lacking with this technology. The aim of the present project is to reveal new perspectives in the endoscopic perception of the sinonasal complex and skull base thanks to 3-dimensional endoscopes, which are well suited to access and explore the endonasal corridor. In the anatomic dissection herein, this innovative device came across with sophisticated and long-established fresh cadaver preparation provided by one of the most prestigious universities of Europe. The final product is a 3-dimensional journey starting from the nasal cavity, reaching the anterior, middle, and posterior cranial fossae, passing through the ethmoidal complex, paranasal sinuses, and skull base. Anatomic landmarks, critical areas, and tips and tricks to safely dissect delicate anatomic structures are addressed through audio comments, figures, and their captions
- …