5,054 research outputs found

    Policy analysis for self-administrated role-based access control

    No full text
    Current techniques for security analysis of administrative role-based access control (ARBAC) policies restrict themselves to the separate administration assumption that essentially separates administrative roles from regular ones. The naive algorithm of tracking all users is all that is known for the security analysis of ARBAC policies without separate administration, and the state space explosion that this results in precludes building effective tools. In contrast, the separate administration assumption greatly simplifies the analysis since it makes it sufficient to track only one user at a time. However, separation limits the expressiveness of the models and restricts modeling distributed administrative control. In this paper, we undertake a fundamental study of analysis of ARBAC policies without the separate administration restriction, and show that analysis algorithms can be built that track only a bounded number of users, where the bound depends only on the number of administrative roles in the system. Using this fundamental insight paves the way for us to design an involved heuristic to further tame the state space explosion in practical systems. Our results are also very effective when applied on policies designed under the separate administration restriction. We implement our techniques and report on experiments conducted on several realistic case studies

    Security Analysis of Role-based Access Control through Program Verification

    No full text
    We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction based tools available for program verification. Our scheme uses a combination of abstraction and reduction to program verification to perform security analysis. We convert ARBAC policies to imperative programs that simulate the policy abstractly, and then utilize further abstract-interpretation techniques from program analysis to analyze the programs in order to prove the policies secure. We argue that the aggressive set-abstractions and numerical-abstractions we use are natural and appropriate in the access control setting. We implement our scheme using a tool called VAC that translates ARBAC policies to imperative programs followed by an interval-based static analysis of the program, and show that we can effectively prove access control policies correct. The salient feature of our approach are the abstraction schemes we develop and the reduction of role-based access control security (which has nothing to do with programs) to program verification problems

    Event-Triggered Observers and Observer-Based Controllers for a Class of Nonlinear Systems

    Full text link
    In this paper, we investigate the stabilization of a nonlinear plant subject to network constraints, under the assumption of partial knowledge of the plant state. The event triggered paradigm is used for the observation and the control of the system. Necessary conditions, making use of the ISS property, are given to guarantee the existence of a triggering mechanism, leading to asymptotic convergence of the observer and system states. The proposed triggering mechanism is illustrated in the stabilization of a robot with a flexible link robot.Comment: Proceedings of the 2015 American Control Conference - ACC 201

    Relaxation due to random collisions with a many-qudit environment

    Get PDF
    We analyze the dynamics of a system qudit of dimension mu sequentially interacting with the nu-dimensional qudits of a chain playing the ore of an environment. Each pairwise collision has been modeled as a random unitary transformation. The relaxation to equilibrium of the purity of the system qudit, averaged over random collisions, is analytically computed by means of a Markov chain approach. In particular, we show that the steady state is the one corresponding to the steady state for random collisions with a single environment qudit of effective dimension nu_e=nu*mu. Finally, we numerically investigate aspects of the entanglement dynamics for qubits (mu=nu=2) and show that random unitary collisions can create multipartite entanglement between the system qudit and the qudits of the chain.Comment: 7 pages, 6 figure

    Hierarchical structuring of Cultural Heritage objects within large aggregations

    Full text link
    Huge amounts of cultural content have been digitised and are available through digital libraries and aggregators like Europeana.eu. However, it is not easy for a user to have an overall picture of what is available nor to find related objects. We propose a method for hier- archically structuring cultural objects at different similarity levels. We describe a fast, scalable clustering algorithm with an automated field selection method for finding semantic clusters. We report a qualitative evaluation on the cluster categories based on records from the UK and a quantitative one on the results from the complete Europeana dataset.Comment: The paper has been published in the proceedings of the TPDL conference, see http://tpdl2013.info. For the final version see http://link.springer.com/chapter/10.1007%2F978-3-642-40501-3_2

    Microwave Harmonic Emission in MgB2 Superconductor: Comparison with YBaCuO

    Full text link
    We report results of microwave second-harmonic generation in ceramic samples of MgB2, prepared by different methods. The SH signal has been investigated as a function of the temperature and the static magnetic field. The results are discussed in the framework of models reported in the literature. We show that the peculiarities of the SH signal are related to the specific properties of the sample. A comparison with the results obtained in ceramic and crystalline YBa(2)Cu(3)O(7) shows that the second-harmonic emission in MgB2 is weaker than that observed in ceramic YBa(2)Cu(3)O(7).Comment: 13 pages, 6 figures; Proceedings of Third Workshop on Metamaterials and Special Materials for Electromagnetic Applications and TLC (Rome, 30-31 March, 2006

    Evolution of Migrating Planets Undergoing Gas Accretion

    Full text link
    We analyze the orbital and mass evolution of planets that undergo run-away gas accretion by means of 2D and 3D hydrodynamic simulations. The disk torque distribution per unit disk mass as a function of radius provides an important diagnostic for the nature of the disk-planet interactions. We first consider torque distributions for nonmigrating planets of fixed mass and show that there is general agreement with the expectations of resonance theory. We then present results of simulations for mass-gaining, migrating planets. For planets with an initial mass of 5 Earth masses, which are embedded in disks with standard parameters and which undergo run-away gas accretion to one Jupiter mass (Mjup), the torque distributions per unit disk mass are largely unaffected by migration and accretion for a given planet mass. The migration rates for these planets are in agreement with the predictions of the standard theory for planet migration (Type I and Type II migration). The planet mass growth occurs through gas capture within the planet's Bondi radius at lower planet masses, the Hill radius at intermediate planet masses, and through reduced accretion at higher planet masses due to gap formation. During run-away mass growth, a planet migrates inwards by only about 20% in radius before achieving a mass of ~1 Mjup. For the above models, we find no evidence of fast migration driven by coorbital torques, known as Type III migration. We do find evidence of Type III migration for a fixed mass planet of Saturn's mass that is immersed in a cold and massive disk. In this case the planet migration is assumed to begin before gap formation completes. The migration is understood through a model in which the torque is due to an asymmetry in density between trapped gas on the leading side of the planet and ambient gas on the trailing side of the planet.Comment: 26 pages, 29 figures. To appear in The Astrophysical Journal vol.684 (September 20, 2008 issue

    A model-driven approach to better identify older people at risk of depression

    Get PDF
    Depression in later life is one of the most common mental disorders. Several instruments have been developed to detect the presence or the absence of certain symptoms or emotional disorders, based on cut-off points. However, the use of a cut-off does not allow identification of depression sub-types or distinguish between mild and severe depression. As a result, depression may be under- or over-diagnosed in older people. This paper aims to apply a model-driven approach to classify individuals into distinct sub-groups, based on different combinations of depressive and emotional conditions. This approach is based on two distinct statistical solutions: first, a latent class analysis is applied to the items collected by the depression scale and, according to the final model, the probability of belonging to each class is calculated for every individual. Second, a factor analysis of these classes is performed to obtain a reduced number of clusters for easy interpretation. We use data collected through the EURO-D scale in a large sample of older individuals, participants of the sixth wave of the Survey of Health, Ageing and Retirement in Europe. We show that by using such a model-based approach it is possible to classify individuals in a more accurate way than the simple dichotomisation ‘depressed’ versus ‘non-depressed’
    corecore