112 research outputs found

    Software security requirements engineering: State of the art

    Get PDF
    Software Engineering has established techniques, methods and technology over two decades. However, due to the lack of understanding of software security vulnerabilities, we have not been so successful in applying software engineering principles that have been established for the past at least 25 years, when developing secure software systems. Therefore, software security can not be just added after a system has been built and delivered to customers as seen in today’s software applications. This keynote paper provides concise methods, techniques, and best practice requirements guidelines on software security and also discusses an Integrated-Secure SDLC model (IS-SDLC), which will benefit practitioners, researchers, learners, and educators

    Software security requirements management as an emerging cloud computing service

    Get PDF
    © 2016 Elsevier Ltd. All rights reserved.Emerging cloud applications are growing rapidly and the need for identifying and managing service requirements is also highly important and critical at present. Software Engineering and Information Systems has established techniques, methods and technology over two decades to help achieve cloud service requirements, design, development, and testing. However, due to the lack of understanding of software security vulnerabilities that should have been identified and managed during the requirements engineering phase, we have not been so successful in applying software engineering, information management, and requirements management principles that have been established for the past at least 25 years, when developing secure software systems. Therefore, software security cannot just be added after a system has been built and delivered to customers as seen in today's software applications. This paper provides concise methods, techniques, and best practice requirements engineering and management as an emerging cloud service (SSREMaaES) and also provides guidelines on software security as a service. This paper also discusses an Integrated-Secure SDLC model (IS-SDLC), which will benefit practitioners, researchers, learners, and educators. This paper illustrates our approach for a large cloud system Amazon EC2 service

    The breakthrough listen search for intelligent life: a wideband data recorder system for the Robert C. Byrd green bank telescope

    Get PDF
    The Breakthrough Listen Initiative is undertaking a comprehensive search for radio and optical signatures from extraterrestrial civilizations. An integral component of the project is the design and implementation of wide-bandwidth data recorder and signal processing systems. The capabilities of these systems, particularly at radio frequencies, directly determine survey speed; further, given a fixed observing time and spectral coverage, they determine sensitivity as well. Here, we detail the Breakthrough Listen wide-bandwidth data recording system deployed at the 100-m aperture Robert C. Byrd Green Bank Telescope. The system digitizes up to 6 GHz of bandwidth at 8 bits for both polarizations, storing the resultant 24 GB/s of data to disk. This system is among the highest data rate baseband recording systems in use in radio astronomy. A future system expansion will double recording capacity, to achieve a total Nyquist bandwidth of 12 GHz in two polarizations. In this paper, we present details of the system architecture, along with salient configuration and disk-write optimizations used to achieve high-throughput data capture on commodity compute servers and consumer-class hard disk drives

    Letter - Union Telephone Company

    No full text
    Letter: From Howard D. Woody, to Stewart Udall, June 24, 1963 (thermofax), page 1UNION TELEPHONE COMPANY SERVING THE NORTHERN SLOPE OF THE HIGH DINTAS MOUNTAIN VIEW. WYOMING June 24, 1963 Stewart L. Udall, Secretary Department of the Interior C Street between 18th and 19th Streets N. W. Washington 25, D. C. Dear Mr. Udall: In March of 1957 we provided communications services to the construction offices of the Bureau of Reclamation at Dutch John, Utah. We have informed the Bureau of Reclamation of our ability and willingness to provide efficient and reliable communications in the power plants; however, invitation No. DS-5976 covering "Telephone Switchboards and Equipment for Glen Canyon and Flaming Gorge Power Plants was written in such a manner as to preclude the telephone companies from submitting a service proposal responsive to the invitation. As early as last summer, we submitted a proposal to the Chief Engineer's office in Denver advising him of our willingness and ability to provide these telephone services; therefore, it is no oversight that the invitation is written exclusively on the basis of government ownership. Also, from statements made by Mr. Bomnett of the Bureau of Reclamation in a letter to the Honorable William Henry Harrison in March of this year, it is only too clear that the policy of this agency is one of government ownership.Epson Perfection 4870 Photo, 400 dpi, 24 bit, 1,873,954 byte

    Untitled letter from Howard Woody to Stewart Udall, June 24, 1963

    No full text
    Thermofax of letter (2 p) from Howard Woody to Stewart Udall, June 24, 1963 and coversheet (1 p) from Orren Beaty to Kenneth Holum, June 28, 1963.Epson Perfection 4870 Photo, 400 dpi, 24 bi

    Intrusive memories of trauma in PTSD and addiction

    No full text

    Detection of differentially regulated genes in ischaemic equine intestinal mucosa.

    No full text
    Item does not contain fulltextREASONS FOR PERFORMING STUDY: Colic is a serious disease syndrome in horses. Much of the mortality is associated with ischaemic-injured intestine during strangulating obstruction, yet there is limited understanding of the associated molecular events. Identification of differentially expressed genes during ischaemic injury should expand our understanding of colic and may lead to novel targeted therapeutic approaches in the future. OBJECTIVE: To isolate and identify differentially expressed genes in equine jejunum following a 2 h ischaemic event compared to normally perfused jejunum. METHODS: Suppressive subtractive hybridisation was used to clone genes that are differentially expressed in equine jejunum injured by 2 h of complete ischaemia as compared to time-matched control jejunal tissues. Expression of selected clones was further evaluated by northern blot analysis. RESULTS: Of the 384 clones selected, 157 were confirmed to possess cDNAs corresponding differentially expressed genes by dot blot analysis. Two genes, fatty acid binding protein 2 and calcium-activated chloride channel 4 were further confirmed to be differentially expressed by northern blot analysis. CONCLUSIONS: Suppressive subtractive hybridisation can be used to detect changes in expression of a broad array of genes, as confirmed by northern blot analysis of selected genes. POTENTIAL RELEVANCE: These initial results have identified a pool of equine intestinal epithelial genes that are differentially expressed following a 2 h ischaemic event. In particular, genes indicative of deranged metabolic activity and those potentially involved in early repair events were identified and may ultimately provide clues as to the nature of epithelial ischaemic injury in horses
    corecore