6,508 research outputs found

    Name-passing calculi and crypto-primitives: A survey

    No full text
    The paper surveys the literature on high-level name-passing process calculi, and their extensions with cryptographic primitives. The survey is by no means exhaustive, for essentially two reasons. First, in trying to provide a coherent presentation of different ideas and techniques, one inevitably ends up leaving out the approaches that do not fit the intended roadmap. Secondly, the literature on the subject has been growing at very high rate over the years. As a consequence, we decided to concentrate on few papers that introduce the main ideas, in the hope that discussing them in some detail will provide sufficient insight for further reading

    Arsenic precipitation by an anaerobic arsenic-respiring bacterial strain isolated from the polluted sediments of Orbetello Lagoon, Italy

    Get PDF
    AIMS: To isolate and characterize an anaerobic bacterial strain from the deeper polluted lagoon sediment able to use as electron acceptors [As(V)] and sulfate (SO4(2-)), using lactate as an electron donor. METHODS AND RESULTS: Methods for isolation from polluted lagoon sediments included anaerobic enrichment cultures in the presence of As(V) and SO4(2-). Reduction of As(V) to As(III) was observed during the growth of the bacterial strain, and the final concentration of As(III) was lower than the initial As(V) one, suggesting the immobilization of As(III) in the yellow precipitate. The precipitate was identified by energy dispersive spectroscopy X-ray as arsenic sulfide. Scanning electron microscopy (SEM) revealed rod-shaped bacterial cells embedded in the precipitate, where net-like formations strictly related to the bacterial cells were visible. The surface of the precipitate showed the adhesion of bacterial cells, forming clusters. Transmission electron microscopy (TEM) also highlighted precipitates inside the bacterial cells and on their surface. Following 16S rRNA sequencing, the bacterial strain 063 was assigned to the genus Desulfosporosinus. CONCLUSIONS: This study reports, for the first time, the isolation from the polluted lagoon sediments of a strain capable of respiring and using As(V) and SO4(2-) as electron acceptors with lactate as the sole carbon and energy source with the formation of an arsenic sulfide precipitate. SIGNIFICANCE AND IMPACT OF THE STUDY: The identification of these properties provides novel insight into the possible use of the anaerobic strain in bioremediation processes and also adds to the knowledge on the biogeochemical cycling of arsenic

    A hard lesson: Assessing the HTTPS deployment of Italian university websites

    Get PDF
    In this paper we carry out a systematic analysis of the state of the HTTPS deployment of the most popular Italian university websites. Our analysis focuses on three different key aspects: HTTPS adoption and activation, HTTPS certificates, and cryptographic TLS implementations. Our investigation shows that the current state of the HTTPS deployment is unsatisfactory, yet it is possible to significantly improve the level of security by working exclusively at the web application layer. We hope this observation will encourage site operators to take actions to improve the current state of protection

    Epoxy/ graphene nanocomposites ā€“ processing and properties: a review

    Get PDF
    Graphene has recently attracted significant academic and industrial interest because of its excellent performance in mechanical, electrical and thermal applications. Graphene can significantly improve physical properties of epoxy at extremely small loading when incorporated appropriately. Herein, the structure, preparation and properties of epoxy/graphene nanocomposites are reviewed in general, along with detailed examples drawn from the key scientific literature. The modification of graphene and the utilization of these materials in the fabrication of nanocomposites with different processing methods have been explored. This review has been focused on the processing methods and mechanical, electrical, thermal, and fire retardant properties of the nanocomposites. The synergic effects of graphene and other fillers in epoxy matrix have been summarised as well

    A Semantic Hierarchy for Erasure Policies

    Get PDF
    We consider the problem of logical data erasure, contrasting with physical erasure in the same way that end-to-end information flow control contrasts with access control. We present a semantic hierarchy for erasure policies, using a possibilistic knowledge-based semantics to define policy satisfaction such that there is an intuitively clear upper bound on what information an erasure policy permits to be retained. Our hierarchy allows a rich class of erasure policies to be expressed, taking account of the power of the attacker, how much information may be retained, and under what conditions it may be retained. While our main aim is to specify erasure policies, the semantic framework allows quite general information-flow policies to be formulated for a variety of semantic notions of secrecy.Comment: 18 pages, ICISS 201

    A logarithmic epiperimetric inequality for the obstacle problem

    Full text link
    For the general obstacle problem, we prove by direct methods an epiperimetric inequality at regular and singular points, thus answering a question of Weiss (Invent. Math., 138 (1999), 23--50). In particular at singular points we introduce a new tool, which we call logarithmic epiperimetric inequality, which yields an explicit logarithmic modulus of continuity on the C1C^1 regularity of the singular set, thus improving previous results of Caffarelli and Monneau

    Non-interference for deterministic interactive programs

    Get PDF
    We consider the problem of defining an appropriate notion of non-interference (NI) for deterministic interactive programs. Previous work on the security of interactive programs by O'Neill, Clarkson and Chong (CSFW 2006) builds on earlier ideas due to Wittbold and Johnson (Symposium on Security and Privacy 1990), and argues for a notion of NI defined in terms of strategies modelling the behaviour of users. We show that, for deterministic interactive programs, it is not necessary to consider strategies and that a simple stream model of the users' behaviour is sufficient. The key technical result is that, for deterministic programs, stream-based NI implies the apparently more general strategy-based NI (in fact we consider a wider class of strategies than those of O'Neill et al). We give our results in terms of a simple notion of Input-Output Labelled Transition System, thus allowing application of the results to a large class of deterministic interactive programming languages

    EChO Payload electronics architecture and SW design

    Full text link
    EChO is a three-modules (VNIR, SWIR, MWIR), highly integrated spectrometer, covering the wavelength range from 0.55 Ī¼\mum, to 11.0 Ī¼\mum. The baseline design includes the goal wavelength extension to 0.4 Ī¼\mum while an optional LWIR module extends the range to the goal wavelength of 16.0 Ī¼\mum. An Instrument Control Unit (ICU) is foreseen as the main electronic subsystem interfacing the spacecraft and collecting data from all the payload spectrometers modules. ICU is in charge of two main tasks: the overall payload control (Instrument Control Function) and the housekeepings and scientific data digital processing (Data Processing Function), including the lossless compression prior to store the science data to the Solid State Mass Memory of the Spacecraft. These two main tasks are accomplished thanks to the Payload On Board Software (P-OBSW) running on the ICU CPUs.Comment: Experimental Astronomy - EChO Special Issue 201
    • ā€¦
    corecore