3,763 research outputs found

    Just forget it - The semantics and enforcement of information erasure

    Get PDF
    Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased once that purpose has been fulfilled. A familiar example is that of online credit card transactions: a customer typically provides credit card details to a payment system on the understanding that the following promises are kept: (i) Noninterference (NI): the card details may flow to the bank (in order that the payment can be authorised) but not to other users of the system; (ii) Erasure: the payment system will not retain any record of the card details once the transaction is complete. This example shows that we need to reason about NI and erasure in combination, and that we need to consider interactive systems: the card details are used in the interaction between the principals, and then erased; without the interaction, the card details could be dispensed with altogether and erasure would be unnecessary. The contributions of this paper are as follows. (i) We show that an end-to-end erasure property can be encoded as a “flow sensitive ” noninterference property. (ii) By a judicious choice of language construct to support erasur

    Whittier College Days

    Get PDF

    The First Decade

    Get PDF

    James Cleland Gilchrist

    Get PDF

    Moses Willard Bartlett

    Get PDF

    Convex hull method for the determination of vapour-liquid equilibria (VLE) phase diagrams for binary and ternary systems

    Get PDF
    Amieibibama Joseph wishes to thank Petroleum Technology Development Fund (PTDF) for their financial support which has made this research possible.Peer reviewedPostprin

    Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration

    Get PDF
    Researchers are pursuing methods of securing the cyber aspect of the U.S. power grid, one of the country\u27s most critical infrastructures. An attacker who is able to infiltrate an Energy Management System (EMS) can instruct elements of the grid to function improperly or can skew the state information received by the control programs or operators. In addition, a cyber attack can combine multiple attacks and affect many physical locations at once. A study of the possible adverse effects an attack could generate can underline the urgency of improving grid security, contribute to a roadmap and priority list for security researchers, and advise on how defending against cyber attacks can differ from defending against point failures and physical attacks. In this paper I discuss the physical and cyber systems that compose the power grid, and I explore ways in which a compromise of the cyber system can affect the physical system, with a particular emphasis on the best means of creating large disturbances. Further, I consider ways in which cyber attacks differ from physical attacks
    corecore