1,623 research outputs found

    Prevention of occupational exposure of tuberculosis to health care workers

    Get PDF
    The resurgence of tuberculosis in the United States within the past decade has prompted the health care community to develop tuberculosis elimination policies. However, recent outbreaks of tuberculosis have proved to be resistant to multiple antibiotics. Tuberculosis infections among health care workers is also rising. This increase in occupational exposures has prompted the examination of current exposure control measures. The occupational exposure to tuberculosis is prevented by the use of administrative policies, engineering controls and personal protective equipment. Each control measure has inherent strengths and weaknesses and when implemented through an exposure control plan the risk of occupational exposure can be reduced. Control techniques currently utilized may benefit from additional research and development. The research will not be squandered if tuberculosis is ultimately eliminated, as the knowledge gained may prove beneficial for exposure protection from future bio-hazardous aerosols

    The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

    Full text link
    The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies. Surprisingly, almost all discussions in the current literature assume that hijacking incidents are enabled by the lack of security mechanisms in the inter-domain routing protocol BGP. In this paper, we discuss an attacker model that accounts for the hijacking of network ownership information stored in Regional Internet Registry (RIR) databases. We show that such threats emerge from abandoned Internet resources (e.g., IP address blocks, AS numbers). When DNS names expire, attackers gain the opportunity to take resource ownership by re-registering domain names that are referenced by corresponding RIR database objects. We argue that this kind of attack is more attractive than conventional hijacking, since the attacker can act in full anonymity on behalf of a victim. Despite corresponding incidents have been observed in the past, current detection techniques are not qualified to deal with these attacks. We show that they are feasible with very little effort, and analyze the risk potential of abandoned Internet resources for the European service region: our findings reveal that currently 73 /24 IP prefixes and 7 ASes are vulnerable to be stealthily abused. We discuss countermeasures and outline research directions towards preventive solutions.Comment: Final version for TMA 201

    CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP

    Full text link
    The Internet routing protocol BGP expresses topological reachability and policy-based decisions simultaneously in path vectors. A complete view on the Internet backbone routing is given by the collection of all valid routes, which is infeasible to obtain due to information hiding of BGP, the lack of omnipresent collection points, and data complexity. Commonly, graph-based data models are used to represent the Internet topology from a given set of BGP routing tables but fall short of explaining policy contexts. As a consequence, routing anomalies such as route leaks and interception attacks cannot be explained with graphs. In this paper, we use formal languages to represent the global routing system in a rigorous model. Our CAIR framework translates BGP announcements into a finite route language that allows for the incremental construction of minimal route automata. CAIR preserves route diversity, is highly efficient, and well-suited to monitor BGP path changes in real-time. We formally derive implementable search patterns for route leaks and interception attacks. In contrast to the state-of-the-art, we can detect these incidents. In practical experiments, we analyze public BGP data over the last seven years

    The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem

    Full text link
    In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now 33% of established connections supporting CT. With the increasing deployment of CT, there are also concerns of information leakage due to all certificates being visible in CT logs. To understand this threat, we introduce a CT honeypot and show that data from CT logs is being used to identify targets for scanning campaigns only minutes after certificate issuance. We present and evaluate a methodology to learn and validate new subdomains from the vast number of domains extracted from CT logged certificates.Comment: To be published at ACM IMC 201

    Validation of treatment escalation as a definition of atopic eczema flares.

    Get PDF
    BACKGROUND: Atopic eczema (AE) is a chronic disease with flares and remissions. Long-term control of AE flares has been identified as a core outcome domain for AE trials. However, it is unclear how flares should be defined and measured. OBJECTIVE: To validate two concepts of AE flares based on daily reports of topical medication use: (i) escalation of treatment and (ii) days of topical anti-inflammatory medication use (topical corticosteroids and/or calcineurin inhibitors). METHODS: Data from two published AE studies (studies A (n=336) and B (n=60)) were analysed separately. Validity and feasibility of flare definitions were assessed using daily global bother (scale 0 to 10) as the reference standard. Intra-class correlations were reported for continuous variables, and odds ratios and area under the receiver operator characteristic (ROC) curve for binary outcome measures. RESULTS: Good agreement was found between both AE flare definitions and change in global bother: area under the ROC curve for treatment escalation of 0.70 and 0.73 in studies A and B respectively, and area under the ROC curve of 0.69 for topical anti-inflammatory medication use (Study A only). Significant positive relationships were found between validated severity scales (POEM, SASSAD, TIS) and the duration of AE flares occurring in the previous week - POEM and SASSAD rose by half a point for each unit increase in number of days in flare. Smaller increases were observed on the TIS scale. Completeness of daily diaries was 95% for Study A and 60% for Study B over 16 weeks). CONCLUSION: Both definitions were good proxy indicators of AE flares. We found no evidence that 'escalation of treatment' was a better measure of AE flares than 'use of topical anti-inflammatory medications'. Capturing disease flares in AE trials through daily recording of medication use is feasible and appears to be a good indicator of long-term control. TRIAL REGISTRATION: Current Controlled Trials ISRCTN71423189 (Study A)

    The Mental and Physical Health of Mothers of Children with Special Health Care Needs in the United States

    Get PDF
    OBJECTIVE: To determine the prevalence of poor mental and physical health among mothers of children with special health care needs (CSHCN) and to determine the association between maternal health and the child\u27s number of special health care needs (SHCN) and severity of ability limitation. METHODS: We used the combined 2016-2018 National Survey of Children\u27s Health Dataset of 102,341 children ages 0-17 including 23,280 CSHCN. We used regression models to examine the associations of a child\u27s number of SHCN and ability limitations with maternal health. RESULTS: Twice as many mothers of CSHCN had poor mental and physical health compared to non-CSHCN (mental 10.3% vs. 4.0%, p \u3c .001; physical 11.9% vs 5.0%, p \u3c .001). In regression models, increased number of SHCN and severity of activity limitations were associated with significantly increased odds of poor maternal health. CONCLUSIONS FOR PRACTICE: Mothers of CSHCN have worse health compared to mothers of non-CSHCN, especially those who experience social disadvantage and those with children with complex SHCN or severe ability limitations. Interventions to improve the health of these particularly vulnerable caregivers of CSHCN are warranted

    Mercury's Weather-Beaten Surface: Understanding Mercury in the Context of Lunar and Asteroid Space Weathering Studies

    Get PDF
    Understanding the composition of Mercury's crust is key to comprehending the formation of the planet. The regolith, derived from the crustal bedrock, has been altered via a set of space weathering processes. These processes are the same set of mechanisms that work to form Mercury's exosphere, and are moderated by the local space environment and the presence of an intrinsic planetary magnetic field. The alterations need to be understood in order to determine the initial crustal compositions. The complex interrelationships between Mercury's exospheric processes, the space environment, and surface composition are examined and reviewed. The processes are examined in the context of our understanding of these same processes on the lunar and asteroid regoliths. Keywords: Mercury (planet) Space weathering Surface processes Exosphere Surface composition Space environment

    Constraints on the χ_(c1) versus χ_(c2) polarizations in proton-proton collisions at √s = 8 TeV

    Get PDF
    The polarizations of promptly produced χ_(c1) and χ_(c2) mesons are studied using data collected by the CMS experiment at the LHC, in proton-proton collisions at √s=8  TeV. The χ_c states are reconstructed via their radiative decays χ_c → J/ψγ, with the photons being measured through conversions to e⁺e⁻, which allows the two states to be well resolved. The polarizations are measured in the helicity frame, through the analysis of the χ_(c2) to χ_(c1) yield ratio as a function of the polar or azimuthal angle of the positive muon emitted in the J/ψ → μ⁺μ⁻ decay, in three bins of J/ψ transverse momentum. While no differences are seen between the two states in terms of azimuthal decay angle distributions, they are observed to have significantly different polar anisotropies. The measurement favors a scenario where at least one of the two states is strongly polarized along the helicity quantization axis, in agreement with nonrelativistic quantum chromodynamics predictions. This is the first measurement of significantly polarized quarkonia produced at high transverse momentum
    corecore