48 research outputs found

    Towards Shared Ownership in the Cloud

    Get PDF
    Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to the notion of shared ownership. This can be a significant limitation in many collaborations because, for example, one owner can delete files and revoke access without consulting the other collaborators. In this paper, we first formally define a notion of shared ownership within a file access control model. We then propose two possible instantiations of our proposed shared ownership model. Our first solution, called Commune, relies on secure file dispersal and collusion-resistant secret sharing to ensure that all access grants in the cloud require the support of an agreed threshold of owners. As such, Commune can be used in existing clouds without modifications to the platforms. Our second solution, dubbed Comrade, leverages the blockchain technology in order to reach consensus on access control decision. Unlike Commune, Comrade requires that the cloud is able to translate access control decisions that reach consensus in the blockchain into storage access control rules, thus requiring minor modifications to existing clouds. We analyze the security of our proposals and compare/evaluate their performance through implementation integrated with Amazon S3

    Differentiation-Dependent Secretion of Proangiogenic Factors by Mesenchymal Stem Cells

    Get PDF
    Mesenchymal stem cells (MSCs) are a promising cell population for cell-based bone repair due to their proliferative potential, ability to differentiate into bone-forming osteoblasts, and their secretion of potent trophic factors that stimulate angiogenesis and neovascularization. To promote bone healing, autogenous or allogeneic MSCs are transplanted into bone defects after differentiation to varying degrees down the osteogenic lineage. However, the contribution of the stage of osteogenic differentiation upon angiogenic factor secretion is unclear. We hypothesized that the proangiogenic potential of MSCs was dependent upon their stage of osteogenic differentiation. After 7 days of culture, we observed the greatest osteogenic differentiation of MSCs when cells were cultured with dexamethasone (OM+). Conversely, VEGF protein secretion and upregulation of angiogenic genes were greatest in MSCs cultured in growth media (GM). Using conditioned media from MSCs in each culture condition, GM-conditioned media maximized proliferation and enhanced chemotactic migration and tubule formation of endothelial colony forming cells (ECFCs). The addition of a neutralizing VEGF165/121 antibody to conditioned media attenuated ECFC proliferation and chemotactic migration. ECFCs seeded on microcarrier beads and co-cultured with MSCs previously cultured in GM in a fibrin gel exhibited superior sprouting compared to MSCs previously cultured in OM+. These results confirm that MSCs induced farther down the osteogenic lineage possess reduced proangiogenic potential, thereby providing important findings for consideration when using MSCs for bone repair

    A comprehensive overview of radioguided surgery using gamma detection probe technology

    Get PDF
    The concept of radioguided surgery, which was first developed some 60 years ago, involves the use of a radiation detection probe system for the intraoperative detection of radionuclides. The use of gamma detection probe technology in radioguided surgery has tremendously expanded and has evolved into what is now considered an established discipline within the practice of surgery, revolutionizing the surgical management of many malignancies, including breast cancer, melanoma, and colorectal cancer, as well as the surgical management of parathyroid disease. The impact of radioguided surgery on the surgical management of cancer patients includes providing vital and real-time information to the surgeon regarding the location and extent of disease, as well as regarding the assessment of surgical resection margins. Additionally, it has allowed the surgeon to minimize the surgical invasiveness of many diagnostic and therapeutic procedures, while still maintaining maximum benefit to the cancer patient. In the current review, we have attempted to comprehensively evaluate the history, technical aspects, and clinical applications of radioguided surgery using gamma detection probe technology

    Observing many researchers using the same data and hypothesis reveals a hidden universe of uncertainty

    Get PDF
    This study explores how researchers’ analytical choices affect the reliability of scientific findings. Most discussions of reliability problems in science focus on systematic biases. We broaden the lens to emphasize the idiosyncrasy of conscious and unconscious decisions that researchers make during data analysis. We coordinated 161 researchers in 73 research teams and observed their research decisions as they used the same data to independently test the same prominent social science hypothesis: that greater immigration reduces support for social policies among the public. In this typical case of social science research, research teams reported both widely diverging numerical findings and substantive conclusions despite identical start conditions. Researchers’ expertise, prior beliefs, and expectations barely predict the wide variation in research outcomes. More than 95% of the total variance in numerical results remains unexplained even after qualitative coding of all identifiable decisions in each team’s workflow. This reveals a universe of uncertainty that remains hidden when considering a single study in isolation. The idiosyncratic nature of how researchers’ results and conclusions varied is a previously underappreciated explanation for why many scientific hypotheses remain contested. These results call for greater epistemic humility and clarity in reporting scientific findings

    The Crowdsourced Replication Initiative: Investigating Immigration and Social Policy Preferences. Executive Report.

    Get PDF
    In an era of mass migration, social scientists, populist parties and social movements raise concerns over the future of immigration-destination societies. What impacts does this have on policy and social solidarity? Comparative cross-national research, relying mostly on secondary data, has findings in different directions. There is a threat of selective model reporting and lack of replicability. The heterogeneity of countries obscures attempts to clearly define data-generating models. P-hacking and HARKing lurk among standard research practices in this area.This project employs crowdsourcing to address these issues. It draws on replication, deliberation, meta-analysis and harnessing the power of many minds at once. The Crowdsourced Replication Initiative carries two main goals, (a) to better investigate the linkage between immigration and social policy preferences across countries, and (b) to develop crowdsourcing as a social science method. The Executive Report provides short reviews of the area of social policy preferences and immigration, and the methods and impetus behind crowdsourcing plus a description of the entire project. Three main areas of findings will appear in three papers, that are registered as PAPs or in process

    On the privacy provisions of Bloom filters in lightweight bitcoin clients

    No full text
    Lightweight Bitcoin clients are gaining increasing adoption among Bitcoin users, owing to their reduced resource and bandwidth consumption. These clients support a simplified payment verification (SPV) mode as they are only required to download and verify a part of the block chain — thus supporting the usage of Bitcoin on constrained devices, such as smartphones. SPV clients rely on Bloom filters to receive transactions that are relevant to their local wallet. These filters embed all the Bitcoin addresses used by the SPV clients, and are outsourced to more powerful Bitcoin nodes which then only forward to those clients transactions relevant to their outsourced Bloom filters. In this paper, we explore the privacy of existing SPV clients. We show analytically and empirically that the reliance on Bloom filters within existing SPV clients leaks considerable information about the addresses of Bitcoin users. Our results show that an SPV client who uses a modest number of Bitcoin addresses (e.g., < 20) risks revealing almost all of his addresses. We also show that this information leakage is further exacerbated when users restart their SPV clients and/or when the adversary has access to more than one Bloom filter pertaining to the same SPV client. Motivated by these findings, we propose an efficient countermeasure to enhance the privacy of users which rely on SPV clients; our proposal can be directly integrated within existing SPV client implementations

    Rapid Progression of Ocean Acidification in the California Current System

    No full text
    Acidification Blues The increase in the concentration of atmospheric carbon dioxide threatens the health of the ocean's ecosystems because of the resulting acidification of the ocean and the decrease in its carbonate saturation state. Gruber et al. (p. 220 , published online 14 June) used a regional ocean model to project how the saturation state of aragonite, a form of calcium carbonate that is produced by many marine organisms, will change in the California Current System through the year 2050. The sea floor along many parts of the California coast is likely to become exposed to year-round aragonite undersaturation within the next 20 to 30 years, a situation that could severely reduce the range of habitats for marine shellfish. </jats:p
    corecore