1,603 research outputs found
Policy Driven Management for Distributed Systems
Separating management policy from the automated managers which interpret the policy facilitates the dynamic change of behavior of a distributed management system. This permits it to adapt to evolutionary changes in the system being managed and to new application requirements. Changing the behavior of automated managers can be achieved by changing the policy without having to reimplement them—this permits the reuse of the managers in different environments. It is also useful to have a clear specification of the policy applying to human managers in an enterprise. This paper describes the work on policy which has come out of two related ESPRIT funded projects, SysMan and IDSM. Two classes of policy are elaborated—authorization policies define what a manager is permitted to do and obligation policies define what a manager must do. Policies are specified as objects which define a relationship between subjects (managers) and targets (managed objects). Domains are used to group the objects to which a policy applies. Policy objects also have attributes specifying the action to be performed and constraints limiting the applicability of the policy. We show how a number of example policies can be modeled using these objects and briefly mention issues relating to policy hierarchy and conflicts between overlapping policies. © 1994, Plenum Publishing Corporation. All rights reserved.Accepted versio
Phase Lags in the Optical-Infrared Light Curves of AGB Stars
To search for phase lags in the optical-infrared light curves of asymptotic
giant branch stars, we have compared infrared data from the COBE DIRBE
satellite with optical light curves from the AAVSO and other sources. We found
17 examples of phase lags in the time of maximum in the infrared vs. that in
the optical, and 4 stars with no observed lags. There is a clear difference
between the Mira variables and the semi-regulars in the sample, with the
maximum in the optical preceding that in the near-infrared in the Miras, while
in most of the semi-regulars no lags are observed. Comparison to published
theoretical models indicates that the phase lags in the Miras are due to strong
titanium oxide absorption in the visual at stellar maximum, and suggests that
Miras pulsate in the fundamental mode, while at least some semi-regulars are
first overtone pulsators. There is a clear optical-near-infrared phase lag in
the carbon-rich Mira V CrB; this is likely due to C2 and CN absorption
variations in the optical.Comment: AJ, in pres
Recommended from our members
Arguing satisfaction of security requirements
This chapter presents a process for security requirements elicitation and analysis,
based around the construction of a satisfaction argument for the security of a
system. The process starts with the enumeration of security goals based on assets
in the system, then uses these goals to derive security requirements in the form of
constraints. Next, a satisfaction argument for the system is constructed, using a
problem-centered representation, a formal proof to analyze properties that can be
demonstrated, and structured informal argumentation of the assumptions exposed
during construction of the argument. Constructing the satisfaction argument can
expose missing and inconsistent assumptions about system context and behavior
that effect security, and a completed argument provides assurances that a system
can respect its security requirements
Arguing security: validating security requirements using structured argumentation
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon claims about domain properties, and a set of informal arguments that justify the claims. Building on our earlier work on trust assumptions and security requirements, we show how using satisfaction arguments assists in clarifying how a system satisfies its security requirements, in the process identifying those properties of domains that are critical to the requirements
A framework for security requirements engineering
This paper presents a framework for security requirements
elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on assets in the system. These goals are used to derive security requirements in the form of constraints. The system context is described using a problem-centered notation, then this context is
validated against the security requirements through construction of a satisfaction argument. The satisfaction argument is in two parts: a formal argument that the system can meet its security requirements, and a structured informal argument supporting the assumptions expressed in the formal argument. The construction
of the satisfaction argument may fail, revealing either that the security requirement cannot be satisfied in the context, or that the context does not contain sufficient information to develop the argument. In this case, designers and architects are asked to provide additional design information to resolve the problems
Self-consistent modelling of the polar thermosphere and ionosphere to magnetospheric convection and precipitation (invited review)
It has recently been demonstrated that the dramatic effects of plasma precipitation and convection on the composition and dynamics of the polar thermosphere and ionosphere include a number of strong interactive, or feedback, processes. To aid the evaluation of these feedback processes, a joint three dimensional time dependent global model of the Earth's thermosphere and ionosphere was developed in a collaboration between University College London and Sheffield University. This model includes self consistent coupling between the thermosphere and the ionosphere in the polar regions. Some of the major features in the polar ionosphere, which the initial simulations indicate are due to the strong coupling of ions and neutrals in the presence of strong electric fields and energetic electron precipitation are reviewed. The model is also able to simulate seasonal and Universal time variations in the polar thermosphere and ionospheric regions which are due to the variations of solar photoionization in specific geomagnetic regions such as the cusp and polar cap
Limits on radio emission from pulsar wind nebulae
We report on a sensitive survey for radio pulsar wind nebulae (PWN) towards
27 energetic and/or high velocity pulsars. Observations were carried out at 1.4
GHz using the Very Large Array and the Australia Telescope Compact Array, and
utilised pulsar-gating to search for off-pulse emission. These observing
parameters resulted in a considerably more sensitive search than previous
surveys, and could detect PWN over a much wider range of spatial scales (and
hence ambient densities and pulsar velocities). However, no emission clearly
corresponding to a PWN was discovered. Based on these non-detections we argue
that the young and energetic pulsars in our sample have winds typical of young
pulsars, but produce unobservable PWN because they reside in low density (n
approx 0.003 cm^-3) regions of the ISM. However, non-detections of PWN around
older and less energetic pulsars can only be explained if the radio luminosity
of their winds is less than 1e-5 of their spin-down luminosity, implying an
efficiency at least an order of magnitude smaller than that seen for young
pulsars.Comment: 9 pages, 3 embedded EPS files. Accepted to MNRA
Recommended from our members
A small RNA makes a Bic difference
Highly specific gene knockouts in mice for the microRNA miR155 show multiple defects in adaptive immunity
Multifrequency Radio Observations of the Crab Pulsar
Previously unseen profile components of the Crab pulsar have been discovered
in a study of the frequency-dependent behavior of its average pulse profile
between 0.33 and 8.4 GHz. One new component, 36 degrees ahead of the main pulse
at 1.4 GHz, is not coincident with the position of the precursor at lower
frequencies. Two additional, flat-spectrum components appear after the
interpulse between 1.4 and 8.4 GHz. The normal interpulse undergoes a
transition in phase and spectrum by disappearing near 2.7 GHz, and reappearing
10 degrees earlier in phase at 4.8 and 8.4 GHz with a new spectral index. The
radio frequency main disappears for frequencies above 4.8 GHz, even though it
is seen at infrared, optical, and higher energies. The existence of the
additional components at high frequency and the strange, frequency-dependent
behavior is unlike anything seen in other pulsars, and cannot easily be
explained by emission from a simple dipole field geometry.Comment: 13 pages. Source is single LaTeX file with 3 figures, using aaspp and
epsf style files (included). To appear in The Astrophysical Journal,
September 1996. Paper can also be found at http://www.ee.nmt.edu
Shifting the paradigm on cultural property and heritage in international law and armed conflict: time to talk about reparations?
The demolition of the mausoleums in Timbuktu, the destruction of the Temple of Bel in Palmyra, and the aerial bombardment of the Old City of Sana’a in Yemen - each mark a continuing trend of intentionally targeting cultural property, and disregard for its protection under international humanitarian law. From as far back as records of war exist, through to contemporary conflicts, cultural sites have been a target for states and non-state armed groups. The destruction is used as a means to delegitimise opponents and displace their populations, reject the symbols of a regime, disrupt a sense of continuity for communities and corrode collective identities. (Brosché et al. 2017 & Ascherson 2005) While international law has focused on a three-P approach (hereafter ‘PPP’), imposing obligations on states to preserve, protect and prosecute the destruction of cultural property, treaties in this area remain silent on the aftermaths of such violence with little attention to reconstruction or reparative measures, thus further endangering sites. Moreover, such treaties emphasise the physical and properterial manifestations of heritage, neglecting its more intangible manifestations that are equally destroyed – such as language and traditions, oral history, songs and dance. As a result there is a vast lacuna in addressing the real impact of war on communities whose cultural heritage, and through it the cultural bonds between individuals and across generations, is destroyed.AHR
- …