124 research outputs found

    A Formulation of the Potential for Communication Condition using C2KA

    Full text link
    An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this paper, we propose a formulation of one of the necessary conditions for the existence of covert channels: the potential for communication condition. Then, we discuss when the potential for communication is preserved after the modification of system agents in a potential communication path. Our approach is based on the mathematical framework of Communicating Concurrent Kleene Algebra (C2KA). While existing approaches only consider the potential for communication via shared environments, the approach proposed in this paper also considers the potential for communication via external stimuli.Comment: In Proceedings GandALF 2014, arXiv:1408.556

    Cognitive Correlates of Storytelling in Severe TBI

    Get PDF
    Introduction: Difficulties with narrative discourse, executive functions, declarative memory, and pragmatic function are pervasive in adults with TBI. As narrative discourse (e.g., storytelling) plays a significant role in social contexts, these difficulties have broad reaching impacts on everyday interactions. Existing research in adults with TBI does not address cognitive correlates of story length, completeness, or elaboration within a story grammar framework, which is a structure for organizing the content of stories. A better understanding of these relationships will allow for more effective evaluation and treatment for this population. Methods: Transcripts from Cinderella stories of 48 participants with severe TBI were analyzed using a story grammar framework. Relationships between narrative measures (length, completeness, and elaboration) and deficits in executive function, declarative memory, and pragmatic function at 6- and 12-months post-injury were explored. Results: At 6- and 12-months, most narrative measures showed weak to strong correlations with executive functions and declarative memory. Narrative measures less consistently showed weak to moderate correlations with pragmatic function at 6-months, but no correlations with pragmatic function observed at 12-months. Discussion: Executive function and declarative memory measures appear related to the ability to organize, elaborate, and share more content when telling stories. Measures of pragmatic function likely captured a broader picture of social communication than the narrative measures examined in the present study, explaining the frequent lack of observed relationships. Together these findings can help us better understand narrative language deficits post-TBI, and better plan assessments and treatments of functional communication

    Oral Health Needs Assessment of an Inner-City Homeless Population and Follow-up of Dental Referrals

    Get PDF
    Background: The University of Connecticut (UConn) School of Dental Medicine (SODM) routinely recruits dental students and faculty volunteers to conduct no-cost dental health screenings for transient residents at South Park Inn Homeless Shelter in Hartford, CT. Once screened, patients are referred to UConn or another hospital-based dental clinic in the area for treatment. The purpose of this study was to determine the demographics and oral health needs of the homeless population at South Park Inn and referrals to UConn SODM were followed to verify patient presentation at UCONN SODM. Dental students’ attitudes towards working with the underserved were also assessed. Methods: A retrospective analysis was conducted of 527 dental screening surveys administered at South Park Inn homeless shelter in Hartford, CT. Current UConn dental students that participated in South Park dental screens were administered a survey evaluating their experiences at the homeless shelter. Results: Half of the study participants had acute dental needs, 35% declared a chief complaint requiring prompt attention, 72% displayed clinically visible decay, and 36% had retained all of their adult teeth. Of the homeless residents that were referred to UConn for dental care, 18% had at least one dental visit at UConn SODM. In addition, the survey of dental students found that the majority of student volunteers believed their experience working with this homeless population increased their comfort with working with underserved populations and enhanced their dental education. Conclusion: This study informs public health practitioners about the needs of the homeless population located in Hartford, Connecticut. A better understanding of oral health issues common to the homeless can allow for an oral health outreach program to be designed that is appropriately prepared to meet the needs of this community and is readily accessible by the homeless population

    Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems

    Get PDF
    Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and/or hardware components. Despite extensive testing of individual components, security vulnerabilities resulting from unintended and unforeseen component interactions (so-called implicit interactions) often remain undetected. This paper presents a method for identifying the existence of implicit interactions in designs of distributed cyber-physical systems using the algebraic modeling framework known as Communicating Concurrent Kleene Algebra (C²KA). Experimental results verifying the applicability of C²KA for identifying dependencies in system designs that would otherwise be very hard to find are also presented. More broadly, this research aims to advance the specification, design, and implementation of distributed cyber-physical systems with improved cybersecurity assurance by providing a new way of thinking about the problem of implicit interactions through the application of formal methods

    Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics

    Get PDF
    AbstractThis is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack

    The use of dynamic volumetric CT angiography (DV-CTA) for the characterization of endoleaks following fenestrated endovascular aortic aneurysm repair (f-EVAR)

    Get PDF
    Accurate endoleak classification is essential following fenestrated endovascular aneurysm repair (f-EVAR). Both endoleak type and exact source of endoleak have implications upon the urgency and complexity of future management strategies. Herein we report on a patient with a documented endoleak post-f-EVAR, in which the source of blood flow into the aneurysm sac could not be determined using conventional computed tomographic angiography. Consequently, dynamic volumetric computed tomographic angiography (DV-CTA) was employed, which clearly illustrated the site of origin of the endoleak. DV-CTA enables accurate endoleak characterization following f-EVAR, with excellent conspicuity of the source of blood flow into the aneurysm sac
    corecore