8 research outputs found

    A New Paradigm to Address Threats for Virtualized Services

    Get PDF
    With the uptaking of virtualization technologies and the growing usage of public cloud infrastructures, an ever larger number of applications run outside of the traditional enterprise’s perimeter, and require new security paradigms that fit the typical agility and elasticity of cloud models in service creation and management. Though some recent proposals have integrated security appliances in the logical application topology, we argue that this approach is sub-optimal. Indeed, we believe that embedding security agents in virtualization containers and delegating the control logic to the software orchestrator provides a much more effective, flexible, and scalable solution to the problem. In this paper, we motivate our mindset and outline a novel framework for assessing cyber-threats of virtualized applications and services. We also review existing technologies that build the foundation of our proposal, which we are going to develop in the context of a joint research project

    The Nuss procedure after breast augmentation for female pectus excavatum

    No full text
    Pectus excavatum, the most common congenital chest wall malformation, has a higher incidence among men. Since 1987, when Donald Nuss performed his technique for the first time, the minimally invasive approach has become the most widely used technique for treating pectus excavatum. Few reported studies have focused on the repair of female pectus excavatum. Women with pectus excavatum often present with breast asymmetry that may require breast augmentation, either before or after pectus excavatum repair. To the authors' knowledge, no reports on the Nuss procedure after breast implant surgery have been published. This report describes the case of a 26-yearold woman who underwent minimally invasive repair after breast implant surgery. The authors believe that for women with severe pectus excavatum, the Nuss procedure should be the first choice for surgical correction. Moreover, for breast implant patients, this technique is absolutely feasible without major complications. \ua9 Springer Science+Business Media, LLC and International Society of Aesthetic Plastic Surgery 2009

    Developing trapping protocols for wood-boring beetles associated with broadleaf trees

    No full text
    Longhorn and jewel beetles are often moved intercontinentally within woody materials. The common use of hardwoods in solid wood-packaging requires efficient trapping protocols for broadleaf-associated species. We tested the effect of lure (ethanol vs multi-lure), trap color (green vs purple), and trap height (understory vs canopy) on the longhorn and jewel beetle species trapped in multi-funnel traps set up in both seminatural forests and reforested forests in Italy. Traps were deployed in a 2 × 2 × 2 factorial scheme, and the eight different treatments were replicated 17 times in a randomized complete block design, in which each block was a different site. Thirty-five longhorn beetle species (2 non-native) and 15 jewel beetle species (all native) were trapped. The multi-lure was more effective than ethanol at detecting most longhorn beetles at both the species and subfamily level (except Lepturinae), but had no effect on the detection of jewel beetles. Trap color affected both jewel (green better than purple) and longhorn beetles with mixed responses among subfamilies. Species richness and/ or abundance of both families was greater in the canopy than the understory, but trends were more heterogeneous at lower taxonomic levels (i.e., significant effect on Cerambycinae and Lepturinae but not on Lamiinae). In general, we showed that green multi-funnel traps baited with multi-lure, and setup in the canopy may be an efficient trapping protocol for European longhorn and jewel beetles associated with broadleaf trees. This information can increase efficacy of early-detection programs carried out both inside and outside of Europe
    corecore