5,466 research outputs found

    SAFIUS - A secure and accountable filesystem over untrusted storage

    Get PDF
    We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability. SAFIUS also enables read/write sharing of data and provides the standard UNIX-like interface for applications. To achieve accountability with good performance, it uses asynchronous signatures; to reduce the space required for storing these signatures, a novel signature pruning mechanism is used. SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS. Preliminary performance studies show that SAFIUS has a tolerable overhead for providing secure storage: while it has an overhead of about 50% of OpenGFS in data intensive workloads (due to the overhead of performing encryption/decryption in software), it is comparable (or better in some cases) to OpenGFS in metadata intensive workloads.Comment: 11pt, 12 pages, 16 figure

    Thymoma with Myasthenia Gravis in Adolescent

    Get PDF
    Thymomas are exceedingly rare in the first 20 years of life, Thymic lesions comprise approximately 2–3% of all pediatric mediastinal tumors and include thymic cysts, hyperplasia, carcinoma, and thymomas. Fewer than 30 cases in children have been described in the literature. Thymomas in adults are commonly associated with other diseases, the most frequent being myasthenia gravis. However, this association has been rarely reported in childhood. These tumors are typically aggressive, with poor outcomes. We report a case of thymoma associated with myasthenia gravis in a 16-year-old girl and review the literature

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Supply and demand for cereals in Nepal, 2010–2030:

    Get PDF
    This paper attempts to estimate the future supply and demand for cereals in Nepal. While there has been considerable research in the past examining the agricultural sector in Nepal, to the best of our knowledge there has been no analysis of the supply-demand scenario for food grains in the country. The analysis undertaken in this paper attempts to bridge this gap in the literature by estimating supply and demand models for the three most important cereals in Nepal's food basket: rice, wheat, and maize. The supply projections have been carried out on the basis of a single-crop production function model using data for the period 1995–2008. For estimating the demand function and projecting future demand, data from the Nepal Living Standards Survey II (NLSS II), undertaken in the year 2003/04, are used.cereal supply, cereal demand,

    NSF CAREER: Scalable Learning and Adaptation with Intelligent Techniques and Neural Networks for Reconfiguration and Survivability of Complex Systems

    Get PDF
    The NSF CAREER program is a premier program that emphasizes the importance the foundation places on the early development of academic careers solely dedicated to stimulating the discovery process in which the excitement of research enriched by inspired teaching and enthusiastic learning. This paper describes the research and education experiences gained by the principal investigator and his research collaborators and students as a result of a NSF CAREER proposal been awarded by the power, control and adaptive networks (PCAN) program of the electrical, communications and cyber systems division, effective June 1, 2004. In addition, suggestions on writing a winning NSF CAREER proposal are presented
    corecore