2,243 research outputs found
DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for the Cloud
Recent advances in distributed computing, grid computing, virtualization mechanisms, and utility computing led into Cloud Computing as one of the industry buzz words of our decade. As the popularity of the services provided in the cloud environment grows exponentially, the exploitation of possible vulnerabilities grows with the same pace. Intrusion Detection and Prevention Systems (IDPSs) are one of the most popular tools among the front line fundamental tools to defend the computation and communication infrastructures from the intruders. In this poster, we propose a distributed, collaborative, and data-driven IDP (DCDIDP) framework for cloud computing environments. Both cloud providers and cloud customers will benefit significantly from DCDIDP that dynamically evolves and gradually mobilizes the resources in the cloud as suspicion about attacks increases. Such system will provide homogeneous IDPS for all the cloud providers that collaborate distributively. It will respond to the attacks, by collaborating with other peers and in a distributed manner, as near as possible to attack sources and at different levels of operations (e.g. network, host, VM). We present the DCDIDP framework and explain its components. However, further explanation is part of our ongoing work
Analysing security and privacy issues of using e-mail address as identity
Nowadays, many websites allow or require users to use their e-mail addresses either as identity or for other purposes. Although username-based identity problems resulting from users’ behaviours have been a research focus for quite some time, the serious issues of using e-mail address as identity and the associated online behaviours of users have not been well investigated. In this paper, we discuss and analyse security and privacy problems resulting from using e-mail address as identity via well-designed user behaviour survey and by investigating websites’ design schemes. Our results illustrate that using e-mail address as identity poses high security and privacy risks. This is mainly because of the multiple usages of e-mail addresses and users’ improper online habits. Moreover, we discuss drawbacks of existing solutions for e-mail address as identity and related password problems, and present potential solutions that may be used to secure online identity management systems in future
Ontology-based access control for social network systems
As the information flowing around in social network systems is mainly related or can be attributed to their users, controlling access to such information by individual users becomes a crucial requirement. The intricate semantic relations among data objects, different users, and between data objects and users further add to the complexity of access control needs. In this paper, we propose an access control model based on semantic web technologies that takes into account the above mentioned complex relations. The proposed model enables expressing much more fine-grained access control policies on a social network knowledge base than the existing models. We demonstrate the applicability of our approach by implementing a proof-of-concept prototype of the proposed access control framework and evaluating its performance
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE
As more businesses and users adopt cloud computing services, security
vulnerabilities will be increasingly found and exploited. There are many
technological and political challenges where investigation of potentially
criminal incidents in the cloud are concerned. Security experts, however, must
still be able to acquire and analyze data in a methodical, rigorous and
forensically sound manner. This work applies the STRIDE asset-based risk
assessment method to cloud computing infrastructure for the purpose of
identifying and assessing an organization's ability to respond to and
investigate breaches in cloud computing environments. An extension to the
STRIDE risk assessment model is proposed to help organizations quickly respond
to incidents while ensuring acquisition and integrity of the largest amount of
digital evidence possible. Further, the proposed model allows organizations to
assess the needs and capacity of their incident responders before an incident
occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on
Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp.
223-236, 201
Security in Dynamic Spectrum Access Systems: A Survey
Dynamic Spectrum Access (DSA) systems are being developed to improve spectrum utilization. Most of the research on DSA systems assumes that the participants involved are honest, cooperative, and that no malicious adversaries will attack or exploit the network. Some recent research efforts have focused on studying security issues in cognitive radios but there are still significant security challenges in the implementation of DSA systems that have not been addressed. In this paper we focus on security issues in DSA. We identify various attacks (e.g., DoS attacks, system penetration, repudiation, spoofing, authorization violation, malware infection, data modification, etc.) and suggest various approaches to address them. We show that significant security issues exist that should be addressed by the research community if DSA is to find its way into production systems. We also show that, in many cases, existing approaches to securing IT systems can be applied to DSA and identify other DSA specific security challenges where additional research will be required
Effects of Grassland Management Practices on Ant Functional Groups in Central North America
Tallgrass prairies of central North America have experienced disturbances including fire and grazing for millennia. Little is known about the effects of these disturbances on prairie ants, even though ants are thought to play major roles in ecosystem maintenance. We implemented three management treatments on remnant and restored grassland tracts in the central U.S., and compared the effects of treatment on abundance of ant functional groups. Management treatments were: (1) patch-burn graze—rotational burning of three spatially distinct patches within a fenced tract, and growing-season cattle grazing; (2) graze-and-burn—burning entire tract every 3 years, and growing-season cattle grazing, and (3) burn-only—burning entire tract every 3 years, but no cattle grazing. Ant species were classified into one of four functional groups. Opportunist ants and the dominant ant species, Formica montana, were more abundant in burn-only tracts than tracts managed with either of the grazing treatments. Generalists were more abundant in graze-and-burn tracts than in burn-only tracts. Abundance of F. montana was negatively associated with pre-treatment time since fire, whereas generalist ant abundance was positively associated. F. montanawere more abundant in restored tracts than remnants, whereas the opposite was true for subdominants and opportunists. In summary, abundance of the dominant F. montana increased in response to intense disturbances that were followed by quick recovery of plant biomass. Generalist ant abundance decreased in response to those disturbances, which we attribute to the effects of competitive dominance of F. montana upon the generalists
The discursive construction of childhood and youth in AIDS interventions in Lesotho's education sector: Beyond global-local dichotomies
This is the post-print version of this article. The definitive, peer-reviewed and edited version of this article is published in Environment and Planning D,Society and Space 28(5) 791 – 810, 2010, available from the link below. Copyright @ 2010 Pion.In southern Africa interventions to halt the spread of AIDS and address its social impacts are commonly targeted at young people, in many cases through the education sector. In Lesotho, education-sector responses to AIDS are the product of negotiation between a range of ‘local’ and ‘global’ actors. Although many interventions are put forward as government policy and implemented by teachers in schools, funding is often provided by bilateral and multilateral donors, and the international ‘AIDS industry’—in the form of UN agencies and international NGOs—sets agendas and makes prescriptions. This paper analyses interviews conducted with policy makers and practitioners in Lesotho and a variety of documents, critically examining the discourses of childhood and youth that are mobilised in producing changes in education policy and practice to address AIDS. Focusing on bursary schemes, life-skills education, and rights-based approaches, the paper concludes that, although dominant ‘global’ discourses are readily identified, they are not simply imported wholesale from the West, but rather are transformed through the organisations and personnel involved in designing and implementing interventions. Nonetheless, the connections through which these discourses are made, and children are subjectified, are central to the power dynamics of neoliberal globalisation. Although the representations of childhood and youth produced through the interventions are hybrid products of local and global discourses, the power relations underlying them are such that they, often unintentionally, serve a neoliberal agenda by depicting young people as individuals in need of saving, of developing personal autonomy, or of exercising individual rights.RGS-IB
Effects of Thyroxine Exposure on Osteogenesis in Mouse Calvarial Pre-Osteoblasts
The incidence of craniosynostosis is one in every 1,800-2500 births. The gene-environment model proposes that if a genetic predisposition is coupled with environmental exposures, the effects can be multiplicative resulting in severely abnormal phenotypes. At present, very little is known about the role of gene-environment interactions in modulating craniosynostosis phenotypes, but prior evidence suggests a role for endocrine factors. Here we provide a report of the effects of thyroid hormone exposure on murine calvaria cells. Murine derived calvaria cells were exposed to critical doses of pharmaceutical thyroxine and analyzed after 3 and 7 days of treatment. Endpoint assays were designed to determine the effects of the hormone exposure on markers of osteogenesis and included, proliferation assay, quantitative ALP activity assay, targeted qPCR for mRNA expression of Runx2, Alp, Ocn, and Twist1, genechip array for 28,853 targets, and targeted osteogenic microarray with qPCR confirmations. Exposure to thyroxine stimulated the cells to express ALP in a dose dependent manner. There were no patterns of difference observed for proliferation. Targeted RNA expression data confirmed expression increases for Alp and Ocn at 7 days in culture. The genechip array suggests substantive expression differences for 46 gene targets and the targeted osteogenesis microarray indicated 23 targets with substantive differences. 11 gene targets were chosen for qPCR confirmation because of their known association with bone or craniosynostosis (Col2a1, Dmp1, Fgf1, 2, Igf1, Mmp9, Phex, Tnf, Htra1, Por, and Dcn). We confirmed substantive increases in mRNA for Phex, FGF1, 2, Tnf, Dmp1, Htra1, Por, Igf1 and Mmp9, and substantive decreases for Dcn. It appears thyroid hormone may exert its effects through increasing osteogenesis. Targets isolated suggest a possible interaction for those gene products associated with calvarial suture growth and homeostasis as well as craniosynostosis. © 2013 Cray et al
People with higher interoceptive sensitivity are more altruistic, but improving interoception does not increase altruism
People consistently show preferences and behaviors that benefit others at a cost to themselves, a phenomenon termed altruism. We investigated if perception of one’s body signals – interoception - may be underlying such behaviors. We tested if participants’ sensitivity to their own heartbeat predicted their decision on a choice between self-interest and altruism, and if improving this sensitivity through training would make participants more altruistic. Across these two experiments, interoceptive sensitivity predicted altruism measured through monetary generosity. Improving interoceptive sensitivity did, however, not lead to more altruistic behaviour. We conclude that there is a unique link between interoception and altruistic behaviour, likely established over an individual’s history of altruistic acts, and the body responses they elicit. The findings suggest that humans might literally ‘listen to their heart’ to guide their altruistic behavior
Validating child vaccination status in a demographic surveillance system using data from a clinical cohort study: evidence from rural South Africa
<p><b>Background:</b> Childhood vaccination coverage can be estimated from a range of sources. This study aims to validate vaccination data from a longitudinal population-based demographic surveillance system (DSS) against data from a clinical cohort study.</p>
<p><b>Methods:</b> The sample includes 821 children in the Vertical Transmission cohort Study (VTS), who were born between December 2001 and April 2005, and were matched to the Africa Centre DSS, in northern KwaZulu-Natal. Vaccination information in the surveillance was collected retrospectively, using standardized questionnaires during bi-annual household visits, when the child was 12 to 23 months of age. DSS vaccination information was based on extraction from a vaccination card or, if the card was not available, on maternal recall. In the VTS, vaccination data was collected at scheduled maternal and child clinic visits when a study nurse administered child vaccinations. We estimated the sensitivity of the surveillance in detecting vaccinations conducted as part of the VTS during these clinic visits.</p>
<p><b>Results:</b> Vaccination data in matched children in the DSS was based on the vaccination card in about two-thirds of the cases and on maternal recall in about one-third. The sensitivity of the vaccination variables in the surveillance was high for all vaccines based on either information from a South African Road-to-Health (RTH) card (0.94-0.97) or maternal recall (0.94-0.98). Addition of maternal recall to the RTH card information had little effect on the sensitivity of the surveillance variable (0.95-0.97). The estimates of sensitivity did not vary significantly, when we stratified the analyses by maternal antenatal HIV status. Addition of maternal recall of vaccination status of the child to the RTH card information significantly increased the proportion of children known to be vaccinated across all vaccines in the DSS.</p>
<p><b>Conclusion:</b> Maternal recall performs well in identifying vaccinated children aged 12-23 months (both in HIV-infected and HIV-uninfected mothers), with sensitivity similar to information extracted from vaccination cards. Information based on both maternal recall and vaccination cards should be used if the aim is to use surveillance data to identify children who received a vaccination.</p>
- …
