311 research outputs found

    Toward automated threat modeling of edge computing systems

    Get PDF
    Edge computing brings processing and storage capabilities closer to the data sources, to reduce network latency, save bandwidth, and preserve data locality. Despite the clear benefits, this paradigm brings unprecedented cyber risks due to the combination of the security issues and challenges typical of cloud and Internet of Things (IoT) worlds. Notwithstanding an increasing interest in edge security by academic and industrial communities, there is still no discernible industry consensus on edge computing security best practices, and activities like threat analysis and countermeasure selection are still not well established and are completely left to security experts.In order to cope with the need for a simplified yet effective threat modeling process, which is affordable in presence of limited security skills and economic resources, and viable in modern development approaches, in this paper, we propose an automated threat modeling and countermeasure selection strategy targeting edge computing systems. Our approach leverages a comprehensive system model able to describe the main involved architectural elements and the associated data flow, with a focus on the specific properties that may actually impact on the applicability of threats and of associated countermeasures

    Control and Local Measurement of the Spin Chemical Potential in a Magnetic Insulator

    Full text link
    The spin chemical potential characterizes the tendency of spins to diffuse. Probing the spin chemical potential could provide insight into materials such as magnetic insulators and spin liquids and aid optimization of spintronic devices. Here, we introduce single-spin magnetometry as a generic platform for non-perturbative, nanoscale characterization of spin chemical potentials. We use this platform to investigate magnons in a magnetic insulator, surprisingly finding that the magnon chemical potential can be efficiently controlled by driving the system's ferromagnetic resonance. We introduce a symmetry-based two-fluid theory describing the underlying magnon processes, realize the first experimental determination of the local thermomagnonic torque, and illustrate the detection sensitivity using electrically controlled spin injection. Our results open the way for nanoscale control and imaging of spin transport in mesoscopic spin systems.Comment: 18 pages, 4 figure

    The Douglas-Fir Genome Sequence Reveals Specialization of the Photosynthetic Apparatus in Pinaceae.

    Get PDF
    A reference genome sequence for Pseudotsuga menziesii var. menziesii (Mirb.) Franco (Coastal Douglas-fir) is reported, thus providing a reference sequence for a third genus of the family Pinaceae. The contiguity and quality of the genome assembly far exceeds that of other conifer reference genome sequences (contig N50 = 44,136 bp and scaffold N50 = 340,704 bp). Incremental improvements in sequencing and assembly technologies are in part responsible for the higher quality reference genome, but it may also be due to a slightly lower exact repeat content in Douglas-fir vs. pine and spruce. Comparative genome annotation with angiosperm species reveals gene-family expansion and contraction in Douglas-fir and other conifers which may account for some of the major morphological and physiological differences between the two major plant groups. Notable differences in the size of the NDH-complex gene family and genes underlying the functional basis of shade tolerance/intolerance were observed. This reference genome sequence not only provides an important resource for Douglas-fir breeders and geneticists but also sheds additional light on the evolutionary processes that have led to the divergence of modern angiosperms from the more ancient gymnosperms

    Management of incidental findings during imaging research in "healthy" volunteers: current UK practice

    Get PDF
    OBJECTIVES: Incidental findings (IF) are becoming increasingly common due to the proliferation of imaging research. IFs can be life-changing for “healthy” volunteers. This study examined variation in IF management in UK research studies of healthy volunteers, including comparison with ethical and legal guidelines, thus providing baseline data and informing future practice. METHODS: Questionnaire of participant background [medical/non-medical; radiologist/non-radiologist; years as principal investigator (PI)], type of research (involving children or not), institutional policy, volunteer information, radiologist involvement in reporting scans and IF disclosure mechanisms. Investigator's current and perceived “ideal” practice was examined. Participants were PIs performing imaging research of healthy volunteers approved by UK ethics committees (2006–2009). RESULTS: 63/146 (43%) surveys completed. 54/61 (88.5%) had site-specific guidelines. Information commonly provided to volunteers should IF be found: personal data (51/62; 82%), contingency plans (54/62; 87%) and disclosure to general practitioner (GP)/treating physician (47/62; 76%). PIs used different strategies for image review. Commonest: radiologist reports research scans only when researcher suspicious of IF [15/57 (26%) compared with 5/28 (16%) in ideal practice]. Commonest ideal reporting strategy: routine reporting by specialist radiologists [9/28 (29%) compared with 8/57 (14%) in current practice]. 49/56 (87.5%) have a standardised disclosure contingency plan, usually involving GP. PIs most commonly disclosed IFs to volunteers when judged relevant (27/58; 47%), most commonly face to face (22/54; 41%), by volunteer's GP (26/60; 43%). Background of PI influenced consent, reporting and disclosure practice. CONCLUSION: There is wide variation in handling IFs in UK imaging research. Much of the current practice contravenes the vague existing legal and ethical guidelines, and is unlikely to be in the best interests of volunteers or researchers

    The Reduction of Flavins by Borohydride: 3,4-Dihydroflavin

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/66296/1/j.1432-1033.1969.tb00621.x.pd

    Incidental findings found in "healthy" volunteers during imaging performed for research: current legal and ethical implications

    Get PDF
    Incidental findings found in “healthy” volunteers during research imaging are common and have important implications for study design and performance, particularly in the areas of informed consent, subjects' rights, clinical image analysis and disclosure. In this study, we aimed to determine current practice and regulations concerning information that should be given to research subjects when obtaining consent, reporting of research images, who should be informed about any incidental findings and the method of disclosure. We reviewed all UK, European and international humanitarian, legal and ethical agencies' guidance. We found that the guidance on what constitutes incidental pathology, how to recognise it and what to do about it is inconsistent between agencies, difficult to find and less complete in the UK than elsewhere. Where given, guidance states that volunteers should be informed during the consent process about how research images will be managed, whether a mechanism exists for identifying incidental findings, arrangements for their disclosure, the potential benefit or harm and therapeutic options. The effects of incidentally discovered pathology on the individual can be complex and far-reaching. Radiologist involvement in analysis of research images varies widely; many incidental findings might therefore go unrecognised. In conclusion, guidance on the management of research imaging is inconsistent, limited and does not address the interests of volunteers. Improved standards to guide management of research images and incidental findings are urgently required

    A Spatially Resolved Dark- versus Light-Zone Microenvironment Signature Subdivides Germinal Center-Related Aggressive B Cell Lymphomas

    Get PDF
    We applied digital spatial profiling for 87 immune and stromal genes to lymph node germinal center (GC) dark- and light-zone (DZ/LZ) regions of interest to obtain a differential signature of these two distinct microenvironments. The spatially resolved 53-genes signature, comprising key genes of the DZ mutational machinery and LZ immune and mesenchymal milieu, was applied to the transcriptomes of 543 GC-related diffuse large B cell lymphomas and double-hit (DH) lymphomas. According to the DZ/LZ signature, the GC-related lymphomas were subclassified into two clusters. The subgroups differed in the distribution of DH cases and survival, with most DH displaying a distinct DZ-like profile. The clustering analysis was also performed using a 25-genes signature composed of genes positively enriched in the non-B, stromal sub-compartments, for the first time achieving DZ/LZ discrimination based on stromal/immune features. The report offers new insight into the GC microenvironment, hinting at a DZ microenvironment of origin in DH lymphomas

    Supporting Users in Cloud Plan Selection

    Get PDF
    Cloud computing is a key technology for outsourcing data and applications to external providers. The current cloud market offers a multitude of solutions (plans) differing from one another in terms of their characteristics. In this context, the selection of the right plan for outsourcing is of paramount importance for users wishing to move their data/applications to the cloud. The scientific community has then developed different models and tools for capturing users\u2019 requirements and evaluating candidate plans to determine the extent to which each of them satisfies such requirements. In this chapter, we illustrate some of the existing solutions proposed for cloud plan selection and for supporting users in the specification of their (crisp and/or fuzzy) needs
    • 

    corecore